Integrated Analytics. A Key Element of Security-Driven Networking
|
|
- Gavin Douglas
- 8 years ago
- Views:
Transcription
1 Integrated Analytics A Key Element of Security-Driven Networking What if your network offered monitoring and visibility into both the overlay and the underlay? What if you could monitor all application flows, handing off those deemed suspicious to your existing security tools? What if you had real-time insight to network performance, helping you to guarantee application SLAs and assisting with capacity planning? And what if this network could perform this without the need for additional taps and matrix switches, saving capital and operational expenses, and offered this capability with tools familiar to your network operations team? pluribusnetworks.com Page 1
2 Today Separate Fabrics IT organizations need to ensure the Application Quality of Experience, which includes ease of application deployment and operation, application performance, and making sure the application makes optimal use of compute, storage, network, and virtualization resources. Traditional approaches to network analytics have had limitations and drawbacks. One of which is expense as it has usually been necessary to build a second monitoring network to aggregate and filter traffic. The expense of this additional networwedgek has also lead to tough choices as it has not always been possible to provide coverage for the entire network, leading to the selective placement of taps and mirroring ports. Additionally, a lack of visibility into overlay traffic has made supporting and troubleshooting virtualized environments difficult. And with security concerns top-of-mind, these limitations in visibility are of increasing concern. Production* Network Visibility*Fabric 3 rd Party*Tools Legacy Tap and Matrix Switch Architecture A Better Way Pluribus Integrated Analytics Netvisor, the Pluribus network operating system, creates an Ethernet fabric where all serverswitches are managed as a single entity, even across 3 rd party spines. This fabric integrates analytics capability, offering a real-time view into all application flows at the host and VM level. Latency, packet loss, and connection durations are all available, and if one or more flows warrant closer investigation, the solution supports full packet capture at tens-of-gigabits a second due to the distributed architecture. pluribusnetworks.com Page 2
3 Ideally, the Pluribus fabric is deployed in a leaf-spine topology, at either L2 or L3, as part of a new DC buildout, an extension Pod, or even a new rack in an existing Pod. Alternatively, you may deploy server-switches at either the TOR or the spine, still gaining full visibility for all traffic flows, or as bumps-in-the-wire. This is a function of Netvisor s standards-based L2/L3 capabilities. Where none of this is possible, we can deploy in tap mode, still taking advantage of full flow analytics and setting the stage for future migration of production traffic onto the Pluribus nodes. This investment protection is unequaled. Pluribus( Integrated(Analytics: Visibility( and(production 3 rd Party(Tools Full Fabric Pod or Rack full switch bandwidth for analytics Production* Network Netvisor Integrated*Analytics 3 rd party*tools Network Monitoring Span/ Taps Application Monitoring Security Tools UC/VoIP Monitoring Tap-Mode full switch bandwidth for analytics Pluribus Integrated Analytics Capabilities: Application-aware Flow Analytics o The network manager is first presented with a dashboard depicting current network topology. Note that this is a view of the entire fabric, and not just pluribusnetworks.com Page 3
4 o o individual switches. If the fabric extends across another vendor s spine switch, the view is still intact. In the upper right is the Time Machine. More on that in a bit. Click on any link, host, or switch for a real-time view as to every connection, including open ports, traffic volume, latency, and duration. Link colors change based on loading. These same statistics are also available via the CLI and via programmatic interfaces for handoff to external tools. Client-Server Connection Flow Analytics o You can now drill-down on any connection, as well as looking at individual hosts and identifying their top destinations. This is useful for capacity planning and identifying unexpected traffic volumes. SYN Flood attack monitoring is all part of this o A powerful source-destination matrix view is also available, highlighting networkwide traffic patterns and also offering a view into anomalies when compared to past patterns. pluribusnetworks.com Page 4
5 Example of Top Talkers Matrix to identify anomalies VM/Overlay visibility o A powerful connection analytics capability is being able to look into the individual VMs along with associated VLANs and VXLAN tunnels. o This includes the status of all connections and any VM migration including updates, movements between ports across the fabric, and number of times a VM is dropped due to loop-detection. VLAN, VXLAN, and VM Migration statistics pluribusnetworks.com Page 5
6 Time Machine o Time Machine provides one of the most powerful fabric capabilities, the ability to view flows over time. This aids forensic analysis, compliance, capacity planning, and troubleshooting. o The Time Machine can use the switch s onboard SSDs, but for additional capacity, the solution supports an optional Sandisk flash drive supporting flow statistics going back a week or even a month (or more) in time. o The top window reflects the current topology. For the bottom view, the administrator has turned the clock back by two weeks. The view now reflects the topology at that time, along with link loading. As with the current view, clicking on any link, host, or switch brings up all associated connections. o The administrator may offload the flow statistics into external databases (i.e., PCAP) for powerful trend analysis. Topology View, Current pluribusnetworks.com Page 6
7 Topology View, 2 weeks ago can click on any link, host, or switch for full connection statistics Real-time flow programmability o Another powerful capability is fabric-wide flow programmability. A flow is defined by fabric ports, MAC, Ether Type, IP, TCP/UDP ports, VLAN, VXLAN, and Class/DSCP/TOS. A rich set of actions that may be applied include dropping the packet, copying the packet for further analysis, modifying the packet header, and other flow-based operations based on real-time traffic patterns. pluribusnetworks.com Page 7
8 Fabric Sniffer o Using flow programmability, timestamped flows are identified for full flow capture with filtering. These are stored in PCAP format, with decoding via an on-board Wireshark or external tools. Inspect the content of each packet, timestamping included. Can look at entire packet. Offload to external storage. pluribusnetworks.com Page 8
9 How does Integrated Analytics relate to your security concerns? Traditionally, enterprises have spent a great deal of effort protecting their perimeters, placing large firewalls in their DMZs. These have grown in performance, and are now capable of protecting against increasingly sophisticated attacks. And more recently, they ve secured their virtual machines at the vswitch with technologies like vshield and when deploying overlays, solutions from Palo Alto and others. Good for virtualized hosts, but what about bare-metal?! North&South) Traditional)Security)Perimeter! As)low)as)~20%)of)the)traffic! Network)Fabric:) Limited/No)security)for)East&West)traffic As#high#as#~80%#of#traffic! Fabric#value#in#monitoring#and#visibility! but#a#separate#monitoring#fabric#is#required! Secure)VMs! Limited/no)security)for)mare)metal)compute Bare%Metal Existing Architectures There is a third part of the network the Ethernet fabric that is left unprotected with existing approaches. And with the growing percentage of east-west traffic, up to 80%, vulnerability is only increasing. If the attack gets through the DMZ due to social engineering, phishing or an interior attack, and if the virtual machines are compromised, the network is left wide open. pluribusnetworks.com Page 9
10 ! E"W/N"S'visibility'of'services/apps'! Forensic'analysis,'auditing,'security'(flow'filtering' w/'packet' capture)! Capacity'planning'(network' utilization,'traffic' patterns,'hot"spots )! Optional'addition'of'virtual'firewalls'within'fabric' for'east"west'and'in"rack'security! Eliminate)taps)and)separate)visibility)fabric! Bare%Metal Pluribus Integrated Analytics This is where Pluribus Integrated Analytics comes into play, complementing existing security hardware and software, and helping protect the network itself. Given the amount of damage that can occur in a very short time, CIOs are recognizing that security must be embedded within the Ethernet fabric. The switches and routers can no longer operate as just dumb packet switching devices, incapable of detecting, acting upon, and recording anomalies. You require a more intelligent network. Conclusion While much attention has been paid to network features and performance, analytics has been somewhat overlooked and even when addressed has been addressed not in a systemic, whole fabric way but rather with a series of bolt-on TAPs and supporting visibility fabrics. Because of the unique fusion of server, switch and storage capabilities supported by Pluribus Netvisor, we are able to integrate sophisticated analytics into the network. This integration enables better visibility into both underlay and overlay traffic while also aiding troubleshooting and security efforts as well. The flexibility of the Pluribus architecture means that not only do greenfield networks benefit, but many of these advantages are applicable to brownfield environments with pluribus at the ToR. pluribusnetworks.com Page 10
11 Features Fabric-wide VM/Host locator Fabric-wide application flow statistics (includes TCP connection latency, time-stamping, top talkers, application, etc.) Fabric-wide port statistics, congestion, latency Fabric-wide vport analytics with OpenStack including host network stats, CPU, mem, disk, OS Fabric-wide sniffer/full packet or flow capture and NFS export (ASDF package) Time Machine Analytics Forensic Network Recorder (ASDF package) Format and save output of connection analytics in parsable file formats (i.e., CSV) VM/Host migration history vflow (capture, drop, re-write, mirror any flow Fabric-wide) sflow (agent, collector, and analyzer) Precision Time Protocol (PTP) version 2 (IEEE ): Transparent Clock and Boundary Clock modes Port mirror to local VM with storage (ASDF package) Mirroring Aggregation with vflow filtering Mirroring/tap aggregation of multiple inputs to 4 output groups F-series only Application flow-based mirror SPAN SSD storage and NFS export; PCIe flash storage (F64-FL1T only) Performance 1G/10G/40G tap aggregation Netvisor fabric operates at the full-switch rate with integrated analytics 1.36 to 2.24 Tbps depending upon platform. All data flows across the fabric are recorded. Real-time analysis of millions of flows; historical analysis of hundreds of millions of flows Record up to 1+ million connections/second (F-series) Storage R/W 130 MB/s SSD and 2,200 MB/s PCIe flash PCIe control plane performance for TCP flow analytics 200 Kpps on E-series and 3 Mpps on F-series Full packet capture at control plane bandwidth, from 4 to 40 Gbps depending upon platform. Orderability Netvisor Integrated Analytics for E68 Leaf Node Netvisor Integrated Analytics for F64M Leaf Node Netvisor Integrated Analytics for F64L Spine Node Netvisor Integrated Analytics for F64XL Spine Node Netvisor Integrated Analytics for F64FL1T Spine Node Netvisor Integrated Analytics for E28Q Spine Node Netvisor Forensic Data Recording Kit (1x800G SSD) NVOS-E68M-A NVOS-F64M-A NVOS-F64L-A NVOS-F64XL-A NVOS-F64FL1T-A NVOS-E28QL-A FDR-KIT pluribusnetworks.com Page 11
Netvisor Software Defined Fabric Architecture
Netvisor Software Defined Fabric Architecture Netvisor Overview The Pluribus Networks network operating system, Netvisor, is designed to power a variety of network devices. The devices Netvisor powers
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
More informationPluribus Netvisor Solution Brief
Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and
More informationData Center Use Cases and Trends
Data Center Use Cases and Trends Amod Dani Managing Director, India Engineering & Operations http://www.arista.com Open 2014 Open Networking Networking Foundation India Symposium, January 31 February 1,
More informationTechnical Bulletin. Enabling Arista Advanced Monitoring. Overview
Technical Bulletin Enabling Arista Advanced Monitoring Overview Highlights: Independent observation networks are costly and can t keep pace with the production network speed increase EOS eapi allows programmatic
More informationData Center Infrastructure of the future. Alexei Agueev, Systems Engineer
Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < echoi@brocade.com> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
More informationScalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationThe Impact of Virtualization on Cloud Networking Arista Networks Whitepaper
Virtualization takes IT by storm The Impact of Virtualization on Cloud Networking The adoption of virtualization in data centers creates the need for a new class of networking designed to support elastic
More informationCarrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable
Brocade Flow Optimizer Making SDN Consumable Business And IT Are Changing Like Never Before Changes in Application Type, Delivery and Consumption Public/Hybrid Cloud SaaS/PaaS Storage Users/ Machines Device
More informationNetwork Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
More informationVCS Monitoring and Troubleshooting Using Brocade Network Advisor
VCS Monitoring and Troubleshooting Using Brocade Network Advisor Brocade Network Advisor is a unified network management platform to manage the entire Brocade network, including both SAN and IP products.
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationHow To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
More informationPluribus Netvisor 2.0 Monitoring and Analytics Engine Features
Pluribus Netvisor 2.0 Monitoring and Analytics Engine Features Overview There are many areas of networking that can benefit from technological advances, including manageability and programmability. Also
More informationOVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationPalo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationNetwork Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013
Network Virtualization and Software-defined Networking Chris Wright and Thomas Graf Red Hat June 14, 2013 Agenda Problem Statement Definitions Solutions She can't take much more of this, captain! Challenges
More informationIntroduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
More informationSoftware Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationEnabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon
Enabling Visibility for Wireshark across Physical, Virtual and SDN Patrick Leong, CTO Gigamon 1 Agenda A review of the network then and now Challenges in network monitoring and security Introduction to
More informationUsing Network Virtualization to Scale Data Centers
Using Network Virtualization to Scale Data Centers Synopsys Santa Clara, CA USA November 2014 1 About Synopsys FY 2014 (Target) $2.055-2.065B* 9,225 Employees ~4,911 Masters / PhD Degrees ~2,248 Patents
More informationHIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES
HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,
More informationMay 13-14, 2015. Copyright 2015 Open Networking User Group. All Rights Reserved Confiden@al Not For Distribu@on
May 13-14, 2015 Virtual Network Overlays Working Group Follow up from last ONUG use case and fire side discussions ONUG users wanted to see formalized feedback ONUG users wanted to see progression in use
More informationSimplify Your Data Center Network to Improve Performance and Decrease Costs
Simplify Your Data Center Network to Improve Performance and Decrease Costs Summary Traditional data center networks are struggling to keep up with new computing requirements. Network architects should
More informationWhite Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
More informationCloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
More informationImpact of Virtualization on Cloud Networking Arista Networks Whitepaper
Overview: Virtualization takes IT by storm The adoption of virtualization in datacenters creates the need for a new class of networks designed to support elasticity of resource allocation, increasingly
More informationVirtualizing the SAN with Software Defined Storage Networks
Software Defined Storage Networks Virtualizing the SAN with Software Defined Storage Networks Introduction Data Center architects continue to face many challenges as they respond to increasing demands
More informationCisco NetFlow Generation Appliance (NGA) 3140
Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance
More informationEthernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
More informationWhite Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationDefinition of a White Box. Benefits of White Boxes
Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies sandeep@ezchip.com Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview
More informationIncrease Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationCisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
More informationSoftware-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
More informationSet Up a VM-Series Firewall on the Citrix SDX Server
Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa
More informationWhere IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine
Where IT perceptions are reality Test Report OCe14000 Performance Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine Document # TEST2014001 v9, October 2014 Copyright 2014 IT Brand
More informationWhat is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
More informationSDN Applications in Today s Data Center
SDN Applications in Today s Data Center Harry Petty Director Data Center & Cloud Networking Cisco Systems, Inc. Santa Clara, CA USA October 2013 1 Customer Insights: Research/ Academia OpenFlow/SDN components
More informationSOFTWARE DEFINED NETWORKING: A PATH TO PROGRAMMABLE NETWORKS. Jason Kleeh September 27, 2012
SOFTWARE DEFINED NETWORKING: A PATH TO PROGRAMMABLE NETWORKS Jason Kleeh September 27, 2012 What if you could Build your next data center optimized for highest demands in flexibility, reliability, and
More informationHow Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
More informationSDN and Data Center Networks
SDN and Data Center Networks 10/9/2013 1 The Rise of SDN The Current Internet and Ethernet Network Technology is based on Autonomous Principle to form a Robust and Fault Tolerant Global Network (Distributed)
More informationHow To Write A Network Plan In Openflow V1.3.3 (For A Test)
OpenFlowand IPv6 Two great tastes that taste great together! Scott Hogg, CTO GTRI Chair Emeritus RMv6TF Infoblox IPv6 COE Today s Outline Software-Defined Networking Background Introduction to OpenFlow
More informationAccelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Date: June 2016 Author: Jack Poller, Senior
More informationWhy sample when you can monitor all network traffic inexpensively?
Why sample when you can monitor all network traffic inexpensively? endace power to see all europe P +44 1223 370 176 E eu@endace.com americas P +1 703 964 3740 E usa@endace.com asia pacific P +64 9 262
More informationJunos Space Network Director
Junos Space Network Director Product Overview Whether in the data center or the campus, today s network managers are learning to overcome many new challenges. Data center network and cloud administrators
More information基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
More informationLeveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
More informationMultitenancy Options in Brocade VCS Fabrics
WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationGetting More Performance and Efficiency in the Application Delivery Network
SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationRedefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
More informationNetwork Packet Monitoring Optimizations in Data Centre
March 2014, HAPPIEST MINDS TECHNOLOGIES Network Packet Monitoring Optimizations in Data Centre Author Dharmraj B Jhatakia 1 Copyright Information This document is an exclusive property of Happiest Minds
More informationActive Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE
More informationTesting Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
More informationSet Up a VM-Series Firewall on an ESXi Server
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
More informationLinux KVM Virtual Traffic Monitoring
Linux KVM Virtual Traffic Monitoring East-West traffic visibility Scott Harvey Director of Engineering October 7th, 2015 apcon.com Speaker Bio Scott Harvey Director of Engineering at APCON Responsible
More informationOpen Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
More informationA Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM
Presenter: Vinit Jain, STSM, System Networking Development, IBM System & Technology Group A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationHow to monitor network traffic inside an ESXi host
created by: Rainer Bemsel Version 1.0 Dated: Dec/30/2012 I ve done several packet analyses on physical wired environment which was easy and pretty straight forward to set up. But with all virtualization
More informationCisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures
White Paper Cisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
More informationNetwork Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim (hlim@gist.ac.kr) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
More informationFabrics that Fit Matching the Network to Today s Data Center Traffic Conditions
Sponsored by Fabrics that Fit Matching the Network to Today s Data Center Traffic Conditions In This Paper Traditional network infrastructures are often costly and hard to administer Today s workloads
More informationNetFlow-Lite offers network administrators and engineers the following capabilities:
Solution Overview Cisco NetFlow-Lite Introduction As networks become more complex and organizations enable more applications, traffic patterns become more diverse and unpredictable. Organizations require
More informationBrocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
More informationNetwork Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
More informationVXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure
W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure
More informationGaining Control of Virtualized Server Environments
Gaining Control of Virtualized Server Environments By Jim Metzler, Ashton Metzler & Associates Distinguished Research Fellow and Co-Founder, Webtorials Editorial/Analyst Division Introduction The traditional
More informationNuage Networks Virtualised Services Platform. Packet Pushers White Paper
Nuage Networks Virtualised Services Platform Packet Pushers White Paper About the Author Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationQRadar Security Management Appliances
QRadar Security Management Appliances Q1 Labs QRadar network security management appliances and related software provide enterprises with an integrated framework that combines typically disparate network
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationSoftware Defined Cloud Networking
Introduction Ethernet networks have evolved significantly since their inception back in the 1980s, with many generational changes to where we are today. Networks are orders of magnitude faster with 10Gbps
More informationAnalysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
More informationIBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
More informationEnsuring end-user quality in NFV-based infrastructure
Ensuring end-user quality in NFV-based infrastructure Distributed NFV cloud nodes provide instant assessment of the end-user experience EXECUTIVE SUMMARY Compute resources for virtual network functions
More informationWhy Software Defined Networking (SDN)? Boyan Sotirov
Why Software Defined Networking (SDN)? Boyan Sotirov Agenda Current State of Networking Why What How When 2 Conventional Networking Many complex functions embedded into the infrastructure OSPF, BGP, Multicast,
More informationSmart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP
Smart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP Gain Access and Visibility to your 10 Gigabit Links Today! 10 Gigabit SR or LR Passive Optical TAP or connect two (2) 10 Gigabit
More informationPanel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26
Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 1 Outline Cloud data center (CDC) Software Defined Network (SDN) Network Function Virtualization (NFV) Conclusion 2 Cloud Computing Cloud computing
More informationEnsuring end-user quality in NFV-based infrastructures
Ensuring end-user quality in NFV-based infrastructures Leveraging distributed NFV cloud nodes to provide instant assessment of end-user experience EXECUTIVE SUMMARY Compute resources for virtual network
More informationCLOUD NETWORKING THE NEXT CHAPTER FLORIN BALUS
CLOUD NETWORKING THE NEXT CHAPTER FLORIN BALUS COMMON APPLICATION VIEW OF THE NETWORK Fallacies of Distributed Computing 1. The network is reliable. 2. Latency is zero. 3. Bandwidth is infinite. 4. The
More informationExpert Reference Series of White Papers. VMware vsphere Distributed Switches
Expert Reference Series of White Papers VMware vsphere Distributed Switches info@globalknowledge.net www.globalknowledge.net VMware vsphere Distributed Switches Rebecca Fitzhugh, VCAP-DCA, VCAP-DCD, VCAP-CIA,
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationSDN v praxi overlay sítí pro OpenStack. 5.10.2015 Daniel Prchal daniel.prchal@hpe.com
SDN v praxi overlay sítí pro OpenStack 5.10.2015 Daniel Prchal daniel.prchal@hpe.com Agenda OpenStack OpenStack Architecture SDN Software Defined Networking OpenStack Networking HP Helion OpenStack HP
More informationTIME TO RETHINK REAL-TIME BIG DATA ANALYTICS
TIME TO RETHINK REAL-TIME BIG DATA ANALYTICS Real-Time Big Data Analytics (RTBDA) has emerged as a new topic in big data discussions. The concepts underpinning RTBDA can be applied in a telecom context,
More informationScalable Network Monitoring with SDN-Based Ethernet Fabrics
Scalable Network Monitoring with SDN-Based Ethernet Fabrics Prashant Gandhi VP, Products & Strategy Big Switch Networks gandhi@bigswitch.com 1 Agenda Trends in Network Monitoring SDN s Role in Network
More information100 Gigabit Ethernet is Here!
100 Gigabit Ethernet is Here! Introduction Ethernet technology has come a long way since its humble beginning in 1973 at Xerox PARC. With each subsequent iteration, there has been a lag between time of
More informationICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
More informationHow To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationIntel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
More informationExtending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
More informationTen Things to Look for in an SDN Controller
Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking
More information