1 Linux KVM Virtual Traffic Monitoring East-West traffic visibility Scott Harvey Director of Engineering October 7th, 2015 apcon.com
2 Speaker Bio Scott Harvey Director of Engineering at APCON Responsible for teams located in Oregon and Texas covering: Datacenter monitoring systems Virtual network monitoring Traffic capture and applications Security bypass tap/switch Optical network taps APCON, Inc. All rights reserved.
3 Session Topic: Linux KVM traffic monitoring Monitoring Virtualized Networks [placeholder, too busy] Goal: A deeper understanding of how data moves in virtualized environments and how to monitor them. More data center traffic is virtualized Let s discuss how virtualized networks work And east-west traffic monitoring technologies APCON, Inc. All rights reserved.
4 Linux KVM Virtual Traffic Monitoring Agenda About APCON Virtualization value proposition Types of virtualization Types of virtual switching The orchestration layer Challenges of monitoring virtualized networks Virtual monitoring techniques Example virtual monitoring solution APCON, Inc. All rights reserved.
5 About APCON Global Network Monitoring Leader Stable 20+ year old private company Fortune 1000 customer base Virtual and physical network monitoring High availability: enterprise class architecture Small 1RU up to large 504 ports in 14RU chassis Virtual network monitoring solutions Global deployments in 40 countries APCON, Inc. All rights reserved.
6 What is Virtualization? Virtualization software is enabling several operating systems and applications to run on one physical server or host. Each self-contained virtual machine (VM) is isolated from the others, and uses as much of the host s computing resources as is configured APCON, Inc. All rights reserved.
7 What does it look like? APCON, Inc. All rights reserved.
8 Why is it important? Linux and Microsoft Virtualization Trends Fast Growing APCON, Inc. All rights reserved.
9 The Benefits of Server Virtualization Virtualization value proposition Up to 80 percent greater utilization of every server or host Reductions in hardware by a ratio of 10:1 or better Capital and operations expenses cut by half, with annual savings of more than $1,500 for each server virtualized Robust, affordable high availability APCON, Inc. All rights reserved. Source: VMware
10 Linux KVM Virtual Traffic Monitoring Types of virtualization Brand variety Type 1 vs type 2 hypervisors APCON, Inc. All rights reserved.
11 Virtual Network Bridge What is it? A virtual network bridge is software that enables multiple VM s to share a physical NIC. Benefits: A simple way for VM applications to access and share the LAN APCON, Inc. All rights reserved.
12 Virtual Switch/Bridge What is it? A virtual switch (vswitch) or bridge is a software application that allows communication between virtual machines as well as the physical network Benefits: Helps ease deployment of virtual machines, and provides similar capabilities of physical Ethernet switches Provides standard Ethernet based intelligent communication between virtual machines and the physical network APCON, Inc. All rights reserved.
13 Virtual Distributed Switch What is it? Centralizes network provisioning, administration and monitoring using data center-wide network aggregation Benefits: Aggregation of per-host virtual switches presented and controlled as a single distributed switch through single configuration at the Datacenter level The vds abstracts configuration of individual virtual switches and enables centralized provisioning, administration, and monitoring APCON, Inc. All rights reserved.
14 What does it look like? Open vswitch VMware vds APCON, Inc. All rights reserved.
15 Linux KVM Virtual Traffic Monitoring The orchestration layer The orchestration layer allows for planned automation and provisioning tasks within a virtual environment APCON, Inc. All rights reserved.
16 The Visibility Challenge Blind Spots! Before Migration After Migration SQL WEB SQL WEB Heavy Traffic Web and SQL apps are heavy talkers Orchestration migrates SQL app Migrating top talkers increases efficiency Blind Spot! Blind spots created Intra-VM is significant traffic Requires virtual monitoring APCON, Inc. All rights reserved.
17 The Enterprise Virtualization Challenge Intra-VM network traffic is a blind spot Elasticity of virtual environment complicates monitoring Complexity to monitor any traffic, across an evolving network, and ensure diagnostic tool compatibility Lack of unified virtual and physical monitoring Tool manufacturers provide proprietary, vendor specific solution APCON, Inc. All rights reserved.
18 Linux KVM Virtual Traffic Monitoring Virtual monitoring techniques Let s discuss three approaches 1. Use vswitch tap/mirror 2. Custom VM or agent application 3. Use native traffic control APCON, Inc. All rights reserved.
19 Linux KVM Virtual Traffic Monitoring Use vswitch tap/mirror Most vswitch s include basic tap/mirror function that can replicate all traffic to a SPAN/ER-SPAN port PROS: Simple approach to use vswitch SPAN/ER-SPAN port CONS: Mirroring all VM traffic across LAN maybe too much bandwidth Replicating traffic burdens vswitch and server performance Mirroring many VMs may not scale due to bandwidth APCON, Inc. All rights reserved.
20 Linux KVM Virtual Traffic Monitoring Custom VM or agent application Installing a vendor specific VM monitoring application or software agent on every server is common approach PROS: Custom application on the server assists with monitoring Can reduce backhaul traffic using filters or sending meta data CONS: Consumes high cost server VM, processor and memory resources Increases maintenance across all servers Often not practical to install custom VMs on all servers Server application may not have network-wide visibility APCON, Inc. All rights reserved.
21 Linux KVM Virtual Traffic Monitoring Use native traffic control Linux KVM has built in traffic control functions that can be accessed to setup virtual taps and traffic filters PROS: Requires no dedicated server resource; minimal vswitch impact Direct efficient access using standard Linux KVM files Filter traffic-of-interest for monitoring Reduces LAN bandwidth used for monitoring CONS: Requires some advanced knowledge of Linux CLI tools APCON, Inc. All rights reserved.
22 Native KVM Traffic Control - Explored There are two types of Linux soft switches Linux bridge OpenVSwitch For every virtual guest port, a vnet tap port is created. Each tap port is accessible via the hypervisor Linux kernel network control mechanisms can be used to steer traffic from internal to external interfaces GRE encapsulation can be used to route traffic to remote endpoint APCON, Inc. All rights reserved.
23 Linux KVM Virtual Machine Example Virtual sever with 4 virtual machines 1. Production Network Internal network within the server. East <-> West traffic not visible from traditional monitoring tools 2. Maintenance Network NAT behind physical interface EM1 3. A network interface for a GRE tunnel to tap select traffic from internal networks APCON, Inc. All rights reserved.
24 How does this look on CLI? When a VM is initiated virtual interfaces are created virsh domiflist rhel7.0 Interface Type Source Model MAC vnet0 bridge VMmaint virtio 52:54:00:7f:81:6b vnet1 network VMPro virtio 52:54:00:8d:20:b7 brctl show ( Linux bridge) bridge name bridge id STP enabled interfaces VMPro cbc4f yes VMPro-nic vnet1 VMmaint bcb04183e no em1 vnet APCON, Inc. All rights reserved.
25 Linux bridge create GRE tunnel Gretap is used to encapsulate layer 2 frames for traffic forwarding and is supported on all Linux distributions. Requires local IP and remote IP. GRE Key, TTL optional CLI commands to setup a GRE encapsulation: ip link add l2gre0 type gretap \ remote \ local key 1 ip link set l2gre0 up APCON, Inc. All rights reserved.
26 Linux bridge - applying taps using TC Traffic control (TC) is a Linux utility to tap and filter vnet interfaces Example: mirror and forward all traffic from vnet0 to tunnel l2gre0 via pass all filter. #setting ingress port tc qdisc add dev vnet0 ingress #setting egress port tc filter add dev vnet0 parent ffff: protocol all \ u32 match u8 0 0 \ action mirred egress mirror dev l2gre APCON, Inc. All rights reserved.
27 Linux bridge - filtering traffic using TC Select traffic of interest by applying a filter on the virtual tap TC filtering is done using a U32 type filter, example below is filtering on IP protocol for ICMP packets > tc filter add dev vnet0 parent ffff: protocol ip pref 3 basic handle 0x1 \ u32( /00ff0000 at 0) \ action order 1: mirred (egress mirror to device l2gre0) pipe\ index 2491 ref 1 bind 1 > APCON, Inc. All rights reserved.
28 Linux bridge - filtering traffic using TC Adding multiple conditional filters can be tedious to type Example of two condition filter compares IP source to (0xC0A8641) and TCP destination port to 7777 filter protocol ip pref 1 basic handle 0x1 ( u32(c0a86401/ffffffff at 12) ) AND ( ( cmp(u8 at 9 layer 1 mask 0xff eq 6) AND cmp(u16 at 2 layer 2 mask 0xffff eq 7777) ) ) action order 1: mirred (Egress Mirror to device l2gre0) pipe index 2483 ref 1 bind APCON, Inc. All rights reserved.
29 OpenVSwitch - creating port mirror over GRE Monitor vnet create mirrors over GRE using OVS commands ifconfig br netmask ovs-vsctl add-br br0 ovs-vsctl add-port br0 vnet1 ovs-vsctl add-port br0 vnet0 ovs-vsctl add-port br0 gre0 \ -- set interface gre0 type=gre options:remote_ip= ,ttl=255,key=5000\ -- get port gre0 \ -- create mirror name=m0 select-all=true \ -- set bridge br APCON, Inc. All rights reserved.
30 More advanced topics for a different discussion Open vswitch VXLAN (Virtual Extensible LAN) STT (Stateless Transport Tunneling) GeNeVE (Generic Network Encapsulation) IPsec Linux/KVM accelerations Intel DPDK (Data Plane Development Kit) PCI-SIG SR-IOV (Single Root I/O Virtualization) PF_RING Netmap APCON, Inc. All rights reserved.
31 Linux KVM Virtual Traffic Monitoring Example of virtual monitoring APCON, Inc. All rights reserved.
32 Linux KVM Virtual Traffic Monitoring APCON, Inc. All rights reserved.
33 Linux KVM Virtual Traffic Monitoring SUMMARY Virtual network visibility is important in today s data center Discussed how data moves in virtual networks Reviewed some east-west traffic monitoring techniques Advantages of traffic control based monitoring for Linux KVM IntellaTap-VE KVM product to seamlessly manage virtual taps in KVM environments. For more information on APCON virtual monitoring visit APCON, Inc. All rights reserved.
34 Linux KVM Monitoring Solutions SPEAKER Scott Harvey Director of Engineering Scott Harvey Director of Engineering APCON, Inc. All rights reserved.
35 Automate vnet monitoring setup (3 steps) 3 Steps 1. Create GRE 2. Tap vnet 3. Create Filter APCON, Inc. All rights reserved.
36 Configuring filters Graphical simpler version of the complex two condition CLI filter APCON, Inc. All rights reserved.
Network Virtualization and Software-defined Networking Chris Wright and Thomas Graf Red Hat June 14, 2013 Agenda Problem Statement Definitions Solutions She can't take much more of this, captain! Challenges
SPEED MATTERS v9.3. All rights reserved. All brand names, trademarks and copyright information cited in this presentation shall remain the property of its registered owners. Telecom - The technology behind
How Linux kernel enables MidoNet s overlay networks for virtualized environments. LinuxTag Berlin, May 2014 About Me: Pino de Candia At Midokura since late 2010: Joined as a Software Engineer Managed the
Underneath OpenStack Quantum: Software Defined Networking with Open vswitch Principal Software Engineer Red Hat, Inc. April 24, 2013 1 Part One Why Open vswitch? Open vswitch enables Linux to become part
Deploy the ExtraHop Discover Appliance on a Linux KVM This document provides information on how to install an ExtraHop Discover EH1000v or EH2000v virtual appliance on a Linux kernel-based virtual machine
Network Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID Contents Introduction Types of Virtualization Network Virtualization OS Virtualization OS Level Virtualization Some Virtualization
Georg Ochs, Smart Cloud Orchestrator (firstname.lastname@example.org) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Where IT perceptions are reality Industry Brief Renaissance in VM Network Connectivity Featuring An approach to network design that starts with the server Document # INDUSTRY2015005 v4, July 2015 Copyright
Ixia Phantom vtap Overview The Ixia Phantom vtap is a software solution that supports all leading hypervisors (VMware vsphere, Microsoft Hyper-V, Citrix enserver, and more), to provide customers 100 percent
Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.
Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista Setting the Stage This presentation will discuss the usage of Linux as a base component of hypervisor components
Overcoming The Blind Spots in Your Virtualized Data Center Matt Percival Sales Manager Northern Europe Stand C4 2014 Ixia Inc. Outline Virtualization Overview Network Monitoring Basics Implementing a Monitoring
White Paper Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Advancements in VMware virtualization technology coupled with the increasing processing capability of hardware platforms
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
Virtualization takes IT by storm The Impact of Virtualization on Cloud Networking The adoption of virtualization in data centers creates the need for a new class of networking designed to support elastic
Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (email@example.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (firstname.lastname@example.org) Senior Architect, Limelight
BROCADE NETWORKING: EXPLORING SOFTWARE-DEFINED NETWORK Gustavo Barros Systems Engineer Brocade Brasil Software- Defined Networking Summary Separate control and data planes Networks are becoming: More programmatic
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
Network Troubleshooting & Configuration in vsphere 5.0 2010 VMware Inc. All rights reserved Agenda Physical Network Introduction to Virtual Network Teaming - Redundancy and Load Balancing VLAN Implementation
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
Network Virtualization Petr Grygárek 1 Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on shared physical infrastructure Total
Security Models for Cloud Kurtis E. Minder, CISSP 1 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson Business
Overview: Virtualization takes IT by storm The adoption of virtualization in datacenters creates the need for a new class of networks designed to support elasticity of resource allocation, increasingly
Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE Overview IT Network Global Solutions Division UNIVERGE Support Center ProgrammableFlow API architecture Microsoft VSEM Provider Third
Nutanix Tech Note VMware vsphere Networking on Nutanix Nutanix Virtual Computing Platform is engineered from the ground up for virtualization and cloud environments. This Tech Note describes vsphere networking
Chair for Network Architectures and Services Technische Universität München Datacenter Network Virtualization in Multi-Tenant Environments 8. DFN-Forum Kommunikationstechnologien Viktor Goldberg, Leibniz-Rechenzentrum,
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer email@example.com Agenda Session Length:
Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
SDN software switch Lagopus and NFV enabled software node Kazuaki OBANA NTT Network Innovation Laboratories SDN software switch Lagopus 1 Motivation Agile and flexible networking Full automation in provisioning,
RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Networking Issues For Big Data. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-13/
Evaluation and Characterization of NFV Infrastructure Solutions on HP Server Platforms DPDK Summit Al Sanders August 17, 2015 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained
Part 1 - What s New in Hyper-V 2012 R2 Clive.Watson@Microsoft.com Datacenter Specialist Microsoft Cloud OS Vision Public Cloud Azure Virtual Machines Windows Azure Pack 1 Consistent Platform Windows Azure
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
OpenStack Neutron Outline Why Neutron? What is Neutron? API Abstractions Plugin Architecture Why Neutron? Networks for Enterprise Applications are Complex. Image from windowssecurity.com Why Neutron? Reason
BUILDING A NEXT-GENERATION DATA CENTER Data center networking has changed significantly during the last few years with the introduction of 10 Gigabit Ethernet (10GE), unified fabrics, highspeed non-blocking
OVN: Open Virtual Network for Open vswitch Ben Pfaff (@Ben_Pfaff) Justin Pettit (@Justin_D_Pettit) Virtual Networking Overview Provides a logical network abstraction on top of a physical network VMA VMB
white paper Network Functions Virtualization Using Intel Multi-host Controller FM10000 Family Introduction Network service providers are finding it increasingly difficult to keep pace with consumer bandwidth
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG North Core Distribution Access South North Peering #1 Upstream #1 Series of Tubes Upstream #2 Core Distribution Access Cust South Internet West
Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Storage XenMotion: Live Storage Migration with Citrix XenServer Enabling cost effective storage migration and management strategies for enterprise and cloud datacenters www.citrix.com Table of Contents
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
WHITE PAPER How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance www.ixiacom.com 915-3132-01 Rev. B, June 2014 2 Table of Contents Network Functions Virtualization (NFV): An
How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 Technical Brief v1.0 February 2013 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED
Presenter: Vinit Jain, STSM, System Networking Development, IBM System & Technology Group A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components
STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due
Why Software Defined Networking (SDN)? Boyan Sotirov Agenda Current State of Networking Why What How When 2 Conventional Networking Many complex functions embedded into the infrastructure OSPF, BGP, Multicast,
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
Building robust private cloud services infrastructures By Brian Gautreau and Gong Wang Private clouds optimize utilization and management of IT resources to heighten availability. Microsoft Private Cloud