Cisco Digital Network Architecture Vision for Virtualization

Size: px
Start display at page:

Download "Cisco Digital Network Architecture Vision for Virtualization"

Transcription

1 Cisco Digital Network Architecture Vision for Virtualization Cisco Digital Network Architecture Vision for Virtualization 2016 Cisco and/or its affiliates. All rights reserved.

2 As enterprise business processes are increasingly digitized, new demands on the enterprise network architecture arise. Cisco s Digital Network Architecture (DNA) is built to facilitate fast and flexible network services that support digitalized business processes. DNA centers around a network infrastructure that is not only fully programmable and open to third party innovation, but can also fully and seamlessly integrate the cloud as an infrastructure component. The DNA controller facilitates simple, automated, and programmatic deployment of network services. It brings the notion of user and application aware policies into the foreground of network operations. With DNA, the network can provide continuous feedback to simplify and optimize network operations and to support digitalized applications to become inherently network aware. This document provides additional details about the virtualization building block of the Digital Network Architecture. The document presents the technical details underpinning the transport virtualization for service segmentation. It also describes the network function virtualization building blocks in detail, including the choice of operating system to simplify virtualization and the orchestration and controller functions. Index Terms Digitalize Services, Cloud, Virtualization, Controllers, Policy, Application-aware networking, Simplicity, Orchestration, Automation, Openness I. Overview As enterprise business processes are increasingly digitized, new demands on the enterprise network architecture arise. Cisco Digital Network Architecture provides a framework for enabling fast and flexible network services that support digitalized business processes. This architecture provides a network infrastructure that is fully programmable and open to third-party innovation and that also fully and transparently integrates the cloud as an infrastructure component. The DNA controller facilitates simple, automated, and programmatic deployment of network services and brings the concept of userand application-aware policies into the foreground of network operations. In Digital Network Architecture, the network provides continuous feedback to simplify and optimize network operations and to help make digitalized applications become inherently network aware. Figure 1 shows the main architectural concepts of the architecture. An overview of is given in [1]. This document provides technical details about how virtualization is implemented in DNA. Virtualization can be categorized into transport virtualization (network segmentation) and network function virtualization. The technical details for both are described here. The document first discusses network function virtualization (NFV), introducing the possible deployment models and the building block components. The next section presents the principles of transport virtualization (segmentation), providing architectural details to segment both the data plane and the control plane. The document concludes with a discussion of the outlook for the evolution of virtualization techniques in Digital Network Architecture Cisco and/or its affiliates. All rights reserved. 2

3 Figure 1. Main Concepts of Cisco Digital Network Architecture Cloud Enabled Network Enabled Applications Collaboration Mobility IoT Security Open APIs Developers Environment Automation Abstraction & Policy Control from Core to Edge Open Standards-Based Analytics Structured Data, Contextual Insights Programmability & Virtualization Physical & Virtual Infrastructure App Hosting Segmentation IOS ASIC This paper is written for CXOs, network architects, and network engineers wanting to understand the technical details underpinning the virtualization aspects of Digital Network Architecture. Engineering-minded decision makers seeking to understand how the architecture supports the business benefits of Cisco DNA may also benefit from this paper. II. Network Function Virtualization Architecture In Digital Network Architecture, network function virtualization, or NFV, allows the flexible placement of Layer 4 through 7 (L4-L7) functions anywhere in the architecture, assuming that the required x86 computing resources are available. These x86 resources can be provided in various form factors to meet the needs of the different domains in the network and to support a variety of use cases. In a data center, existing x86 servers can also host virtual network functions (VNFs) alongside digitalized applications. In the WAN, branch routers such as the Cisco 4000 Series Integrated Services Routers (ISRs) have x86 cores available for this purpose and can be extended with an x86 compute blade: the Cisco UCS E-Series Servers. Network elements are also planned with additional x86 resources (generic compute, memory, storage resources) to accommodate the virtualization of network functions and application hosting. Digital Network Architecture supports two types of operating systems for virtualization: the enhanced Cisco IOS XE network operating system and Cisco NFV Infrastructure Software (NFVIS). Figure 2 shows several deployment options. Use cases in which only a few VNFs are required can be deployed using enhanced Cisco IOS XE in existing network routers or switches. Cisco IOS XE is based on Linux, and this deployment variant feature to allow the VNFs to run in a virtual machine next to the router s Cisco IOS XE software processes. For deployments that require additional x86 resources, a Cisco UCS E-Series blade can be inserted in the chassis of a 4000 Series ISR. In this case, NFVIS supports the virtualization of network functions, as discussed later in this document. Another deployment scenario relies on x86 servers that are co-located with a physical router or switch. In this case, the router or switch is responsible for the IP transport function, whereas the L4-L7 network functions are running in VNFs on the x86 server. This deployment model even allows other router systems (such as the Cisco ISR Generation 2 [ISR G2] routers and the Cisco ASR 1000 Series Aggregations Services Routers) to participate in a virtualized architecture. In a fully virtualized deployment, even the routing function is virtualized. NFVIS controls the hardware elements of an x86-based server, with the associated flexibility to configure as many CPU, memory, and storage resources as required. Figure 2 Enterprise NFV Deployment Models Full NfV L4-7 NfV Router-integrated NFV Router-based NFV VM 1 VM n VM 1 VM n VM 1 VM n NFVIS Licensing PnP Client Monitor LCM Web UI Security NFVIS Licensing Monitor PnP Client Web UI Linux LCM Security NFVIS Licensing Monitor PnP Client Web UI Linux LCM Security IOS XE Container VM 1 VM n Linux eios XE eios XE eios XE 2016 Cisco and/or its affiliates. All rights reserved. 3

4 A. Enterprise NFV: NFVIS Operating System As illustrated in Figure 2, several deployment models are based on NFVIS in the virtualization architecture. NFVIS extends a standard Linux OS distribution by packaging additional functions to simplify the deployment and operation of VNFs. NFVIS delivers the following components and functions: Linux: This common standard OS drives the underlying hardware platforms (Cisco Unified Computing System [Cisco UCS] servers, Cisco UCS E-Series Servers, x-86 enhanced network elements, etc.). Virtualization support: The hypervisor for virtualization is based on the Linux Kernel-based Virtual Machine (KVM) and includes Quick Emulator (QEMU), the libvirt tool, and other associated processes. Virtual switching: Open vswitch (OVS) is supported to enable multiple VNFs to share physical interface resources and to allow traffic to be passed within the x86 host between VNFs. Virtual machine lifecycle management: Management support is provided to deploy VNFs dynamically and to control their liveliness. Plug-and-play (PnP) capability: The PnP client automates the deployment of any host that uses NFVIS. The PnP client can communicate with a PnP server running in the DNA controller and be loaded with the correct host configuration. ConfD: This client enables various open APIs for the controller and orchestration systems. Representational state transfer (REST), commandline interface (CLI), and NETCONF YANG capabilities are supported. Webserver: The webserver enables connectivity to NFVIS through HTTP/HTTPS, which is used particularly to support local management tools. Device management: Tools packaged in NFVIS, including a resource manage, support device management. Statistics collection: Tools such as syslogd, snmpd, and collectd assist in statistics collection and reporting. Service chaining: This function enables service chaining based on the network services header (NSH). Note that NFVIS does not have an integrated virtual router. Virtual routing in an NFVIS system either is provided in a VNF such as in a virtual ISR (ISRv) or is offered by a traditional hardware-based router such as the ISR or ASR 1000 Series. With the packaging described here, NFVIS takes advantage of the popularity of the standard Linux distribution with a KVM hypervisor, but it significantly expands the capabilities to facilitate deployment and operations of VNFs. This approach allows operators to concentrate on delivering digitalized services, rather than on integrating and testing various software components. A particular benefit of NFVIS is the packaging and systems integration of all the required functions and processes for NFV. Figure 3 shows NFVIS in the context of the Digital Network Architecture enterprise virtualization solution. As discussed earlier, NFVIS is the common operating system for NFV running on various hardware platforms. The overall enterprise NFV solution also provides the actual VNFs and the control layer: that is, integration with the enterprise controller and the orchestration system. The various VNFs are not integral parts of NFVIS, but they can be instantiated on demand to offer their respective functions. Both Cisco and third-party VNFs are supported. Examples of such VNFs are the ISRv for virtual routing, the IP Security (IPsec) gateway, and other advanced features offered in Cisco IOS XE. Other examples include the Cisco Adaptive Security Virtual Appliance (ASAv [2] firewall), the Cisco Firepower solution for intrusion prevention systems (IPSs) and intrusion detection systems (IDSs), Cisco Virtual Wide Area Application Services (vwaas) for WAN optimization, etc. Similar VNFs from other vendors can also be instantiated as part of the enterprise NFV solution in Digital Network Architecture, again demonstrating the openness of the architecture. Note also that ordinary digitalized applications can be hosted on a host powered by NFVIS. The DNA controller, as shown in Figure 3, is responsible for the deployment and integration of NFVIS hosts in DNA. Here, the PnP client-server interaction is critical to automate the onboarding process. The controller also manages the configuration of both NFVIS and the VNFs and extracts the telemetry data that may be required for network analytics. Standards-based interfaces such as REST and NETCONF/YANG are used in the communication between the controller layer and an NFVIS host; hence, the ConfD client is included as part of the NFVIS package Cisco and/or its affiliates. All rights reserved. 4

5 Figure 3. Enterprise NFV Using NFVIS: Building Blocks ISRv ISR4K + UCS-E Enterprise Orchestration Enterprise Controller ASAv vwaas vfirepower VNF n App 1 App 2 App n NFVIS UCS The DNA orchestration layer also handles both physical and virtual services. If digitalized services are implemented using virtualization, the architecture is responsible for instantiating the VNFs at the right time in the right location to provide connectivity to these newly instantiated VNFs. It is also responsible for instantiating or modifying existing policy enforcement points (PEPs) to help ensure that the service makes use of these newly instantiated VNFs. Consider the example of a virtualized branchlocation environment in DNA. In a fully virtualized branch environment, an x86-host is located in the enterprise branch to accommodate all functions in a virtual form factor. Figure 4 shows details of a possible configuration, using a Cisco UCS C-Series Rack Server host with multiple physical LAN and WAN interfaces running NFVIS. Several VNFs are instantiated in this example: an ISRv for WAN connectivity (configured for the Cisco Intelligent WAN [IWAN] solution), a vwaas to offer WAN optimization, and a Cisco Firepower appliance for the IPS and IDS functions. Additional VNFs provide Cisco network analysis module (NAM), wireless support (Cisco Wireless LAN Controller [WLC]), virtualized storage, and host application (Microsoft Windows) functions. The VNFs are connected to the NFVIS virtual switch to link them to either the physical interfaces or to each other. In the example, the ISRv is chained to the vwaas and IPS by forcing the traffic through bridge BR1 and then bridge BR0. The other services are directly reachable from the LAN interfaces through BR0. Figure 4 System Architecture for a Virtualized Branch Location in Cisco Digital Network Architecture ISRv IWAN WAAS IPS(t) NAM WLC Win vstorage NFVIS Hypervisor (KVM) Tap7 Tap6 Tap5 Tap4 Tap3 Tap2 Tap1 Tap0 vswitch BR1 BR0 WAN NIC WAN NIC LAN NIC GE5 GE4 GE0 GE1 GE2 GE3 (t) = transparent, Lines connect to SIDE of the text box Non-transparent VNFs: connectors drawn at the BOTTOM of the text box Cisco and/or its affiliates. All rights reserved. 5

6 Figure 5 shows the workflow to arrive at the forwarding state for branch virtualization. In the initial state, the branch does not have routing or L4-L7 functions deployed or configured. Only the end devices, access switches, and WAN links are present (the latter are not connected). As the first step, a branch profile is configured in the orchestration system, specifying the types of network functions that should be deployed in the branch. Actual device configurations are also associated with each function in the profile. To complete the orchestration setup, the profile is associated with a particular branch instance: for example, by correlating the serial number of an x86 host to be deployed with the geographic location of the branch site. This profile and instance setup is communicated to the DNA controller. Upon successful deployment and power-up of the x86 host (such as a Cisco UCS C-Series Server or a Cisco 4000 Series ISR with a Cisco UCS E-Series blade) at the branch, a PnP process is triggered. Upon bootup, the NFVIS system contacts the DNA controller to request its configuration. Because the controller has received the branch profile and associated device configurations from the initial setup process, it is aware of this branch site and can successfully complete the launch of the NFVIS system in the branch by pushing its device configuration. Assuming that the PnP process is completed successfully, the controller notes the site availability in its inventory for subsequent monitoring and management operations. The controller also notifies the orchestrator about the successful instantiation of the hosts, which triggers the next step in the workflow. At this point, the NFVIS host is operational, but without any VNFs deployed. Before actually instantiating the VNFs for the branch according to the profile, a resource check is performed. The orchestrator requests instantaneous resources from the branch through the controller. Assuming again that sufficient resources are available to instantiate the profile, the orchestrator then triggers the creation and configuration of the virtual switching infrastructure required on the NFVIS host using the controller. Next, requests are initiated to deploy actual instances according to the profile. In this step, the ISRv, vwaas, IPS and IDS, vnam, WLC, Windows, and additional VNFs or applications would successively be deployed and connected to the respective virtual bridges in the OVS. As these VNFs are deployed, the associated device configurations are also pushed to the VNFs according to the profile specified in the orchestrator. The device configurations for the VNFs activate the forwarding path on which the packets flow. Note that all interactions between the DNA orchestrator, the DNA controller, NFVIS, and the VNFs are based on the standard APIs that are part of the solution. Figure 5 Workflow to Launch a Virtual Branch Instance in Cisco Digital Network Architecture NFVIS-Host DNA Controller DNA Orchestrator Operator Configures Branch Profiles Operator defines device Configurations & imports into orchestrator Profile applied to Branch instance Register NFVIS configuration for S/No with Controller PnP Agent contacts Controller with S/No of NFVIS NFVIS-Host & config in inventory Device shipped to Branch ACK NFVIS-host Configuration pushed to host Invoke REST API to get NFVIS Platform details (based on IP address) NFVIS returns host resource details Invoke REST API to create OVS Notification of NFVIS instantiation Request resources status of NFVIS instance (mem, CPU..) Resource profile passed to orchestrator Create OVS bridges Create OVS Bridges(s) ACK OVS Bridge creation ACK Invoke REST API to deploy VNF & pass config Deploy VNFs & pass Day 0/1 config VNFs Deployed ACK ACK 2016 Cisco and/or its affiliates. All rights reserved. 6

7 B. Enterprise NFV: Enhanced Cisco IOS XE Operating System Virtualization of network functions by using NVFs is also supported in the enhanced Cisco IOS XE operating system. Cisco IOS XE was designed specifically to run on Linux. In contrast to the traditional Cisco IOS Software that powers routers and switches, Cisco IOS XE supports full modularity. The software infrastructure is composed of the following elements: Cisco IOS Software control plane Fast-forwarding packet processing data plane Middleware software processes to optimize the interprocess communication between the control plane and the data plane KVM hypervisor to enable virtual network functions or application hosting Consider a more detailed comparison between the traditional Cisco IOS Software architecture and the enhanced Cisco IOS XE architecture. In the former, Cisco IOS Software runs the control plane for the network (routing protocols), drives the hardware (interrupts, memory management, and CPU scheduling), and processes packets in the data plane. All functions are run within a single Cisco IOS Software process. In contrast, with enhanced Cisco IOS XE, the controlplane software is separated from the data plane and the underlying systems management. Cisco IOS XE is a modular operating system in which the hardware management functions are performed by the underlying Linux OS. The Cisco IOS XE control plane is responsible only for running the network control functions, providing consistency and backward compatibility with the traditional Cisco IOS Software system. Because of this Linux-based software architecture in Cisco IOS XE, a KVM hypervisor can be configured directly on the underlying Linux system. This approach allows the underlying hardware resources to be shared not only among the native Cisco IOS XE processes, but also by VNFs that run on top of such a hypervisor. Figure 6 illustrates the Cisco IOS XE architecture at a high level. In particular, it shows the KVM hypervisor environment for running VNFs and hosting applications. This architecture is particularly useful for operators who want to retain their Cisco IOS Software network functions. Any routing or switching functions available in Cisco IOS XE natively will be run by the fast-forwarding packet processing control plane, benefiting from the optimized forwarding path and the multitude of data plane features that can be configured in combination. However, L4-L7 networking functions such as WAAS, advanced firewalls, and IPS and IDS can now also be instantiated in a virtual machine. This feature enables operators to choose best-in-class functions and offers a smooth migration path to virtualization. Cisco IOS XE is complemented by the DNA controller which provides the link to software-defined networking (SDN) based management tools. Particularly noteworthy again is the open API in Cisco IOS XE, which allows the controller to configure and influence the operations of a Cisco IOS XE system programmatically. In addition to CLI calls, Cisco IOS XE supports REST and NETCONF YANG. The main characteristics of Cisco IOS XE are: Software modularity based on Linux Network function virtualization Application hosting Model-based APIs SDN-based management Fog and edge computing Figure 6 Enhanced Cisco IOS XE Enterprise NFV: Building Blocks IOSd Control Plane Cisco Apps (WAAS, Snort) LINUX OS KVM/LXC Customer and 3 rd Party Applications Virtual Ethernet Platform-Specific Data Plane AppNav 2016 Cisco and/or its affiliates. All rights reserved. 7

8 III. Transport Virtualization (Segmentation) Architecture Network segmentation is the capability to split a physical network into multiple logical partitions to separate the traffic from different groups of users and devices. The need for network segmentation in the enterprise is not new, but it is becoming more important as a result of the following recent trends: Internet of Things (IoT) and bring your own IoT (BYOI) Mobility in the next-generation workspace Cloud-enabled services and applications For example, with IoT a lot of traditionally non-ip things (such as healthcare instruments and heating, ventilation, and air conditioning [HVAC] and lighting apparatus) are becoming IP enabled and connected to the network. The enterprise infrastructure needs network partitioning to keep these various systems and their administrative and security policies completely separated. Guest access and user and device mobility are other simple but important use cases in which role-based access to internal resources needs to be guaranteed independent of where endpoints connect. Other common use cases for network segmentation are focused on security: Security for multitenant dwellings: For example, airports with multiple airlines, public-sector buildings with multiple agencies, and enterprise buildings in which departmental separation is required (engineering, sales, human resources, etc.) Regulation compliance: Health Insurance Portability and Accountability Act (HIPPAA) requirements in healthcare, Payment Card Industry (PCI) requirements in retail sales, Sarbanes-Oxley requirements in finance, and many others Security for mergers and acquisitions: For example, the need to keep policies differentiated while dealing with overlapping IP addresses Cloud computing security: Security needs in a multitenant private or public cloud environment To meet new customer requirements and provide a solution to address these important industry trends, network segmentation and virtualization is built into DNA to create logical separation of services at Layer 2 and Layer 3. A. Network Segmentation Architecture The Cisco segmentation architecture is based on three main components: network access control, network service edge, and network path isolation (Figure 7) Figure 7. Segmentation Access Control Network Path Isolation Service Edge MPLS EVN VRF lite Functions Policy Based Access Device Authentication and Authorization Classification and VLAN, SGT, ACL enforcement Map VRFs to VLANs in Access and Service Edge VRF segmentation and transport Traffic Isolation Shared or dedicated Services Inter VRFs routing Isolated App environment 2016 Cisco and/or its affiliates. All rights reserved. 8

9 1) Network Access Control The access control function assigns an identity to the users and things that connect to the network so they can be successfully assigned to a corresponding group. A group is used as a pointer to a set of permissions to allow differentiated access for clients and devices. In the context of network segmentation, the identity also provides the linkage to path isolation and virtualization techniques so that permission is enforced throughout the network and not only at the access network device. Access control consists of three main functions: Authentication: Authentication governs who (devices and users) can access the network. Authentication can be performed dynamically through IEEE 802.1x, Web Authentication (Web-Auth), or network-based classification using network sensors. Alternatively, authentication can be performed statically. Authorization: Authorization defines the policies associated with the authenticated endpoint. Policy enforcement: Policy enforcement associates a parameter to identify the endpoint in the rest of the network. This parameter can be a VLAN, a Virtual Routing and Forwarding (VRF) instance, an access control list (ACL), or a security group tag (SGT). It also enforces the policy in DNA by means of the policy enforcement point. Cisco Identity Service Engine (ISE) is the central platform for policy definition and management. It gathers advanced contextual data about who and what is accessing the network and then defines rolebased access policies. 2) Network Service Edge The service edge is the place (central or distributed) at which an enterprise deploys shared resources (Dynamic Host Configuration Protocol [DHCP], Domain Name Service [DNS], Internet access, etc.) or protected resources (for example, human resources databases). By default, the different logical networks (virtual private networks [VPNs]) built on top of the physical infrastructure are completely isolated from each other, so a mechanism to break this behavior is needed to allow shared resources. The technical solutions to implement shared services across virtualized networks include prefix leaking between routing tables using Border Gateway Protocol (BGP) and Cisco Easy Virtual Network (EVN) route replication and the use of a multiple-context firewall. Providing a separate firewall for each VPN allows the application and management of security policies for each virtual network independently, and it is hence the recommended deployment model. Analysis and discussion of the various deployment modes for protecting access to shared services is beyond the scope of this document. Details can be found in [3]. 3) Network Path Isolation Network path isolation (or network virtualization) refers to the creation of multiple logical network partitions overlaid on top of a common physical network infrastructure. Each partition is logically isolated from the others and must appear to the end device or user as a fully dedicated network, and it must provide all forwarding, security, and services expected from a physical network. Virtualization of the transport layer must address virtualization at both the device level and the interconnection level: Device forwarding virtualization: The creation of VLANs for switches and VRF instances for routers are both examples of techniques to create multiple separated control plane and data plane instances on top of the same physical device. Data-path virtualization: Data-path virtualization is the virtualization of the interconnection between devices. This connection can be a single-hop or a multiple-hop interconnection. For example, an Ethernet link between two switches provides a single-hop interconnection that can be virtualized by using IEEE 802.1Q VLAN tags. When an IP cloud separates two virtualized devices, a multiple-hop interconnection is required to provide end-to-end logical isolation and is usually implemented through tunneling. Cisco has multiple solutions for implementing Network Path Virtualization. They can be classified in two main categories: policy based and control-plane based. Policy-based Path Segmentation Policy-based path segmentation restricts the forwarding of traffic to specific destinations based on a defined policy and independent of the information provided by the forwarding control plane. A classic example of policy-based segmentation is the use of VLANs and related ACLs assigned to a switch port or to a service set identifier (SSID) for wireless users. Groups of devices or users are assigned to VLANs and ACLs by static configuration or as a result of the authentication using IEEE 802.1X or other technologies (Figure 8). Although common for use cases such as guest access, this Layer 2 virtualization solution has scalability limitations: every time a VLAN is added, a series of parameters needs to configured on the network devices (subnet, DHCP pool, routing, etc.) Cisco and/or its affiliates. All rights reserved. 9

10 Figure 8. Segmentation ACL Aggregation Layer VLAN Addressing DHCP Scope Redundancy Routing Static ACL Access Layer Quarantine Voice Data Suppliers Guest Also, the logical isolation provided by VLANs ceases to exist at the boundary between Layer 2 and Layer 3 domains (the distribution-layer devices). To extend the propagation beyond the access device, a VRF instance needs to be defined and mapped to the VLAN. Specific to wireless users, peer-to-peer blocking allows simple segmentation to control traffic between users connected to the same SSID by either dropping the traffic or forwarding it to the core network 1. Peerto-peer blocking is used primarily for the guest WLAN and is configured at the SSID level. For Wi-Fi access, customers have been using Control and Provisioning of Wireless Access Points (CAPWAP) protocol to tunnel wireless traffic from access points to a centralized WLC on top of an IP cloud and to provide the desired segmentation. SSIDs broadcast over the air interface are mapped at the WLC to different VLANs as traffic enters the wired network. To add virtualization at Layer 3, the VLAN can be also mapped to a separate VRF instance on the first-hop layer device as shown in Figure 9. The Cisco WLC does not support overlapping IP addresses at this point. VRF-based segmentation is still supported to help ensure logical separation of the different traffic flows. Figure 9. CAPWAP Tunnels VLAN Blue VLAN Red IP Network VRF Blue VRF Red CAPWAP tunnel 1 The forwarding option is available only for traffic switched centrally at the WLC Cisco and/or its affiliates. All rights reserved. 10

11 Figure 10. Cisco TrustSec Solution Single-Hop SXP Speaker SXP Listener SXP Enabled Switch/WLC Non-TrustSec Domain SGT Capable HW In summary, policy-based technologies do not rely on a control plane to transport the virtualization information and, to provide any-to-any segmentation, they use hop-by-hop propagation. This approach can result in more deployment and management complexity and limited scalability. The Cisco TrustSec solution overcomes the above limitations of solutions based on VLANs and ACLs and brings role-based access control (RBAC) to the network: that is, to all devices in the network and not just the access device. The Cisco TrustSec solution does not require changes in VLANs and subnets and works with the existing design (Figure 10). Cisco TrustSec security is based on three functions: Classification: An SGT can be assigned dynamically as the result of Identity Services Engine authorization. Alternatively, it can be assigned through static methods to map the SGT to a VLAN, subnet, or IP address. Propagation: SGT information can be propagated either inline (hop by hop) or through the SGT Exchange Protocol (SXP). Enforcement: The network device enforces the policy through SGT-ACLs dynamically downloaded from the Identity Services Engine. The Cisco TrustSec tag is inserted at Layer 2 in the Ethernet frame in the Cisco TrustSec metadata (CMD) field. For inline propagation, every node in the network needs to be able to interpret the tag and act on it. If the customer deployment does not require any-toany segmentation, Cisco TrustSec can be used with the SXP protocol, which allows the propagation of SGT information across a network that is not enabled for Cisco TrustSec security. Control-Plane-Based Segmentation Control plane-based techniques achieve path isolation by restricting the propagation of routing information to only subnets that belong to a VPN. To achieve control plane virtualization, a Layer 3 device must use the VRF technology, which allows virtualization of the forwarding plane. Path virtualization technologies can be classified based on the way that virtualization information is transported across the underlying network infrastructure: Multihop path isolation: The virtualized devices are not directly connected, and the virtualization information is carried across a network that is not virtualization aware by the use of a Layer 3 tunneling technology. VRF-lite with Generic Routing Encapsulation (GRE) and Multiprotocol Label Switching (MPLS) VPN are examples of multihop solutions. Single-hop path isolation: The VRF information is carried hop by hop, and all the devices in the path need to be VRF aware. VRF-lite and EVN are technologies in this category. 1) Multihop Path Isolation Techniques VRF-lite with GRE is the simplest multihop technology. A GRE tunnel is built between the routers that are part of the same virtual network, and the VRF instances are mapped to the GRE header. The implication is that GRE peering sessions need to be established among all the routers that are part of the virtual network, and if a router is added in a new site, all the existing routers need to be reconfigured. So the solution does not scale very well. Also, GRE tunneling is implemented in hardware only in higher-end switches such as Cisco Catalyst 6500 Series Switches and Cisco Nexus 7000 Series Switches, and not in lower-end switches that can be found at the edge. For these reasons, this technology has not been widely adopted by customers and is recommended only if it is deployed in a hub-and-spoke topology typical of guest access scenarios Cisco and/or its affiliates. All rights reserved. 11

12 In an MPLS VPN design, the exchange of VPN routes is achieved by using an additional control-plane element called Multiprotocol BGP (MP-BGP), which is an extension of the existing BGP-4 protocol. The MPLS core is made up of provider edge (PE) and provider (P) routers. At the PE level, MP-BGP is used to exchange VRF routes (Figure 11). MPLS VPN uses two sets of labels. The outer label represents the PE destination and is used by the PE routers to forward the packet through the network. The inner MPLS label is the VPN label and carries the VRF information. Only the destination PE will interpret this VPN label and forward the original packet to the associated VRF instance. Figure 11. VRF-Based Segmentation PE DATA 4 Byte IGP Label 4 Byte VPN Label P Original Packet As with GRE tunnel overlay architecture, MPLS VPN architecture based on BGP requires a fullmesh neighbor relationship to be established. The added configuration and management complexity of such full-mesh designs can be mitigated by the deployment of BGP route reflectors (RR) to relay the BGP information to other PEs in the network. In case of an MPLS core, Virtual Private LAN Services (VPLS) can also be used to provide a Layer 2 pseudowire service across the core network. VPLS mitigates the Spanning Tree Protocol problems that arise from PE the extension of VLANs across multiple switches. However, VPLS also requires full-mesh control-plane communication and can limit MAC address scalability. In summary, multihop segmentation techniques have the advantage that they touch and virtualize only the devices at the edge of the network; the rest of the network ignores the VPN information. MPLS VPN solutions scale well and support any-to-any connectivity, relying on an underlay MPLS network based on BGP. This approach can require staff to learn new techniques and hence can increase deployment time and costs. Single-Hop and Hop-by-Hop Path Isolation Techniques An example of a single-hop (or hop-by-hop) isolation technique is VRF-lite. In this case, each and every network device is virtualized as are all the devices physical interconnections. From a data-plane perspective, VLAN tags can be used to provide logical isolation on each point-to-point link that interconnects the Layer 3 virtualized network devices. VRF-lite does not rely on the MP-BGP or MPLS label to carry the network segmentation information. Instead, it requires hop-by-hop path isolation. Separate interfaces or subinterfaces must be provisioned for each virtual network on core-facing interfaces on an end-toend virtualized path. Figure 12 shows VLAN-based segmentation with VRF-lite. The use of multiple VRF instances is suitable for networks with a limited number of VRF instances and hops in a virtual network path. As the number of virtual networks grows, new interfaces and subinterfaces and related IP addresses and routing will need to be added, increasing planning and provisioning overhead. To address this complexity, Cisco introduced Easy Virtual Network, or EVN. Figure 12. VLAN-Based Segmentation with VRF-lite R1 R q 802.1q 802.1q 2016 Cisco and/or its affiliates. All rights reserved. 12

13 Figure 13. VLAN-Based Segmentation with Cisco EVN Edges Interfaces Trunk Interface Edges Interfaces 802.1q vnet tag 802.1q R1 R2 With EVN, path isolation can be achieved by using a unique tag for each virtual network. This tag, the virtual network (VNET) tag, is operator assigned. An EVN device on the virtual path uses the tags to separate traffic among the different virtual networks. This approach eliminates the need to depend on physical and logical interfaces to provide traffic separation. As illustrated in Figure 13, only a single trunk interface is required to connect a pair of EVN devices. Also, instead of having to add a new field to carry the VNET tag in a packet, the VLAN ID field in IEEE 802.1Q is repurposed to carry the VNET tag. In summary, VRF-lite and EVN are IP-based solutions that reuse familiar technologies such as IEEE 802.1Q and Interior Gateway Protocol (IGP) routing protocols to provide virtualization. This approach can provide straightforward migration from existing campus architecture and less need for staff learning (for example, because complexities arising from BGP are eliminated). Also, VRF-lite is supported on all the major Cisco Catalyst switches starting with the Cisco Catalyst 3000 Series. With EVN, Cisco enabled easy implementation with the use of EVN tags and features such as route replication that allow greater scalability (up to 32 VRF instances is the current recommendation). Evolution of the Virtualization Technologies The previous sections of this document focus on the virtualization techniques available for deployment in enterprise network architectures today. Additional virtualization solutions first developed for data center architectures are now also starting to be applied in other network domains. For transport virtualization, protocols such as Cisco Locator/ID Separation Protocol (LISP) and Virtual Extensible LAN (VXLAN) are evolving to meet most of the requirements for an optimal segmentation solution: Easy to deploy: The more complex a solution is to deploy, the greater the operating expenses (OpEx). Security-group-based policy: Traffic between devices can be isolated. Scalable: Any-to-any connectivity is provided with no configuration burden. Address family independent: IPv4 and IPv6 are both supported. Incrementally deployable: Incremental deployment helps provide a migration path from the current customer architecture. Mobility aware: Easy mobility for wired and wireless hosts is provided. LISP and VXLAN in combination promise to overcome the scalability limitations of the policy-based technologies described earlier in this document: in particular, the operational challenges imposed by hop-by-hop segmentation. Because it is based on an IP packet format for transport, VXLAN allows virtualization information to be carried in the IP header. Only network elements at the edge require virtualization awareness, and any intermediary network elements operate in IP-forwarding mode only. An IP-based transport such as VXLAN helps organizations migrate to virtualization by eliminating the need for major equipment upgrades and allowing gradual introduction of the new technologies. A LISP control plane can also benefit transport virtualization by facilitating a scalable mechanism to distribute segmentation information. Identity information for endpoints can also be decoupled from the actual location information by the use of the aforementioned techniques with VXLAN and LISP, breaking the bond between endpoint location and identity that is inherent when the IP address is used for both location and identity. Network-based solution: No host change is required Cisco and/or its affiliates. All rights reserved. 13

14 An upcoming evolving NFV technology is based on the concept of service-function chaining (SFC) using the network services header, or NSH. SFC allows the deployment of network functions independent of location. Traffic flows are classified at the network edge, and a header describing the services required for the flow is pushed onto each packet. The (virtualized) network services are then reached by the SFC architecture through overlay tunnels governed by a controller. For example, a flow can be subjected to immediate deep packet inspection (DPI) based classification as the user-network interface (UNI) is traversed. It can then require processing by a firewall instance in a regional office followed by processing by a web filter that is cloud based. SFC enables these services to be applied at the network edge by imposing the respective header for such a chain and by automating the transport path between the services. Another benefit of NSH-based service chaining is the inclusion of metadata in the packet header. The NSH fields added to a flow not only signify the service sequence. They can also carry metadata pertinent to a packet between services, such as the application type or additional segmentation information. Appendix A: Glossary API: Application programming interfaces help enable network elements or functions to be controlled by outside applications. Typically, an API is a set of functions that can be called into a software program with specified parameters and formats to provide input data or receive output from the function. APIs can enable openness and flexibility in Cisco Digital Network Architecture by allowing third-party vendors to contribute to network operations and to accelerate deployment of new services. Cloud: The cloud is the computing, storage, and networking infrastructure offered by the aggregate set of cloud providers as services to run enterprise applications. The cloud is made up of all the data centers used by cloud providers to host applications. The advantage of cloud computing is that these services can be acquired instantaneously upon demand, so that enterprises do not need to invest in data center infrastructure (saving both capital expenditures [CapEx] and operating expenses [OpEx]). The cloud provider services the resources to help ensure that capacity meets demand and that cloud services are offered with redundancy and security. Cloud computing offers a different consumption model (subscription pricing) for computing. Controller: A controller is a network component that manipulates the network elements in Digital Network Architecture according to the policies (to instantiate the services). The controller maintains the full holistic current state of the network: that is, it keeps an abstracted network state. The controller interfaces with the orchestration and policy layers through a northbound interface. Controllers instantiate configuration entries in the network to create transport paths or to implement the services that are offered to the endpoints using a southbound interface. In Digital Network Architecture, a single controller can span multiple domains (cloud, WAN, campus, and data center). Alternatively, multiple controllers can collaborate, each fulfilling a domainspecific role. The functions that controllers run can even be divided among multiple subcontrollers, each specializing in a particular control task, such as monitoring and manipulating the QoS state of the network. Devices: Devices are physical systems capable of running applications and sending or receiving network traffic. Digitalization: Digitalization is the process of bringing digital technologies into all aspects of an enterprise s business and offering digitalized services to the business s consumers. Digitalization also refers to the act of converting business processes into digital formats and take advantage of automated algorithms and processes to optimize and simplify either internal operations or interactions with consumers. DPI: Deep packet inspection is a technique to determine the type of the application carried in an IP flow by inspecting the payload, often over multiple packets, and making inferences based on the payload. This approach contrasts with application characterization based on TCP port numbers or payload type fields, which are often insufficient to adequately characterize an application. Endpoint: Endpoints are consumers of network services defined at the application level. They can run on traditional hosts such as PCs, notebooks, and IP phones, and also increasingly on IP-enabled devices that drive digitalized business processes: robots, point-of-sale (POS) displays, scanners, inventory tracking devices, vehicles, and more. Applications running on servers in a data center are considered consumers of network services and are therefore endpoints in the architecture Cisco and/or its affiliates. All rights reserved. 14

15 Endpoint group (EPG): And EPG is a categorization of multiple endpoints into one logical entity receiving a service from the network. An EPG could bundle all endpoints from a particular end device, for example. Alternatively, an EPG could bundle all endpoints from a particular end user, with the endpoints on multiple physical devices. The term endpoint is used loosely in this document to mean both individual endpoints and endpoint groups. Fabric: A fabric is a collection of network elements that offers communication paths between its outbound-facing ports, providing any-to-any connectivity through the use of overlay tunnels. A fabric is governed by a controller to simplify operation. A service can be instantiated by applying the right policy enforcement to characterize the service instances, and by using the any-to-any connectivity offered by the fabric to reach the service s remote ends. Intent: Intent is the association of a business process with a service. The purpose, or intent, of a service delivered by the network is to implement the business processes relevant to the enterprise. Services, therefore, implement the business intent of the enterprise, and a policy specifies how the service is implemented and enforced by the network. Internet of Things (IoT): The IoT is the extension of the Internet to reach not only traditional computing resources such as PCs, notebooks, and servers, but also any device. This definition implies that IoT devices must become networked: that is, they must be extended to include computing resources on which a networking software stack can run. The definition also typically implies that IoT-enabled devices can run digitalized business applications to benefit from Internet connectivity. Examples of IoT devices include refrigerators, cameras, vehicles, parking meters, production robots, elevators, RFIDequipped hardware, and sensors. The advantage of networked objects equipped with software stacks is that these devices can be controlled remotely, so they help digitalize business processes and services. Intrusion prevention system (IPS) and intrusion detection system (IDS): IPSs and IDSs are sets of network functions that continuously monitor the network. The systems look for behavioral anomalies and malicious activities and take appropriate actions (such as blocking or reporting) when such activities are detected. These systems often rely on baseline behavior characterization (signatures), against which the anomalies are defined. Statistical methods may also be employed. Open networking: Open networking allows the operation of the network architecture to be influenced by third-party software or hardware vendors. It relies on standards-based and published APIs to facilitate such integration. Open networking empowers the community of developers outside Cisco to contribute to network operations and capabilities. Open networking increases the speed of innovation and introduces more flexibility into the network. Orchestrator: This orchestrator allows controlled specification of services in the network and instantiation or ongoing modification of those services. The orchestrator in Digital Network Architecture focuses on service definition from the network consumer s point of view, thus abstracting any low-level details about how, and sometimes where, those services are to be configured. The orchestrator determines the service intent and communicates this to the controller. The controller then manipulates the network elements to provide the transport between the relevant policy enforcement points, to instantiate the policies (transport, security, etc.), and to help ensure that services are monitored on an ongoing basis. Overlay network: The overlay network is based on network tunneling that sits on top of an underlay network. Tunneling techniques are used to decouple a network service from the underlying transport infrastructure. The state of the service is retained only at the edge of the network. For all network elements that make up the underlay network, the tunneled service traffic appears simply as the encapsulated tunnel traffic. Overlay networks are characterized by: Segregation of traffic between users Support for different address spaces Support for dynamic device or virtual machine placement (independent of the underlay topology and addressing) Support for large-scale deployments A network is fully virtualized if virtual network functions, such as routers or firewalls, are connected to each other using VLANs or VRF instances Cisco and/or its affiliates. All rights reserved. 15

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

WHITE PAPER. Network Virtualization: A Data Plane Perspective

WHITE PAPER. Network Virtualization: A Data Plane Perspective WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Enhancing Cisco Networks with Gigamon // White Paper

Enhancing Cisco Networks with Gigamon // White Paper Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,

More information

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business

More information

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,

More information

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network

More information

Cisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures

Cisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures White Paper Cisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

A Basic Virtualized Enterprise

A Basic Virtualized Enterprise C H A P T E R 3 A Basic Virtualized Enterprise In this chapter, we define the technical requirements posed by the need to virtualize the network. Based on these requirements, we propose and architectural

More information

Defining SDN. Overview of SDN Terminology & Concepts. Presented by: Shangxin Du, Cisco TAC Panelist: Pix Xu Jan 2014

Defining SDN. Overview of SDN Terminology & Concepts. Presented by: Shangxin Du, Cisco TAC Panelist: Pix Xu Jan 2014 Defining SDN Overview of SDN Terminology & Concepts Presented by: Shangxin Du, Cisco TAC Panelist: Pix Xu Jan 2014 2013 Cisco and/or its affiliates. All rights reserved. 2 2013 Cisco and/or its affiliates.

More information

Analysis of Network Segmentation Techniques in Cloud Data Centers

Analysis of Network Segmentation Techniques in Cloud Data Centers 64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software

More information

Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches

Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide November 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is

More information

Network Virtualization

Network Virtualization . White Paper Network Services Virtualization What Is Network Virtualization? Business and IT leaders require a more responsive IT infrastructure that can help accelerate business initiatives and remove

More information

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer

More information

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane

More information

What is SDN all about?

What is SDN all about? What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?

More information

VXLAN Bridging & Routing

VXLAN Bridging & Routing VXLAN Bridging & Routing Darrin Machay darrin@arista.com CHI-NOG 05 May 2015 1 VXLAN VM-1 10.10.10.1/24 Subnet A ESX host Subnet B ESX host VM-2 VM-3 VM-4 20.20.20.1/24 10.10.10.2/24 20.20.20.2/24 Load

More information

Intelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, pero.gvozdenica@combis.hr Vedran Hafner, Systems Engineer, vehafner@cisco.

Intelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, pero.gvozdenica@combis.hr Vedran Hafner, Systems Engineer, vehafner@cisco. Intelligent WAN 2.0 principles Pero Gvozdenica, Systems Engineer, pero.gvozdenica@combis.hr Vedran Hafner, Systems Engineer, vehafner@cisco.com Then VS Now Intelligent WAN: Leveraging the Any Transport

More information

The Evolving Data Center. Past, Present and Future Scott Manson CISCO SYSTEMS

The Evolving Data Center. Past, Present and Future Scott Manson CISCO SYSTEMS The Evolving Data Center Past, Present and Future Scott Manson CISCO SYSTEMS Physical» Virtual» Cloud Journey in Compute Physical Workload Virtual Workload Cloud Workload HYPERVISOR 1 VDC- VDC- 2 One App

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

SDN PARTNER INTEGRATION: SANDVINE

SDN PARTNER INTEGRATION: SANDVINE SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions

More information

Definition of a White Box. Benefits of White Boxes

Definition of a White Box. Benefits of White Boxes Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies sandeep@ezchip.com Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview

More information

Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013

Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013 Network Virtualization and Software-defined Networking Chris Wright and Thomas Graf Red Hat June 14, 2013 Agenda Problem Statement Definitions Solutions She can't take much more of this, captain! Challenges

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination

More information

Overview to the Cisco Mobility Services Architecture

Overview to the Cisco Mobility Services Architecture Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly

More information

SDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków

SDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his

More information

Network as an Sensor & Enforcer

Network as an Sensor & Enforcer Network as an Sensor & Enforcer Leveraging the network to control threats Jaromír Pilař jpilar@cisco.com May, 2016 Agenda Overview of Network as a Sensor and Enforcer Network as a Sensor Network as an

More information

Evolution of Software Defined Networking within Cisco s VMDC

Evolution of Software Defined Networking within Cisco s VMDC Evolution of Software Defined Networking within Cisco s VMDC Software-Defined Networking (SDN) has the capability to revolutionize the current data center architecture and its associated networking model.

More information

Software Defined Network (SDN) for Service Providers

Software Defined Network (SDN) for Service Providers Software Defined Network (SDN) for Service Providers Santanu Dasgupta Sr. Consulting Engineer Global Service Provider HQ SANOG 21 January 28th, 2013 2011 2010 Cisco and/or its affiliates. All rights Cisco

More information

SDN Architecture and Service Trend

SDN Architecture and Service Trend 2013 SDN 高 峰 論 壇 SDN Architecture and Service Trend Dr. Yu-Huang Chu Broadband Network Lab Chunghwa Telecom Co., Ltd., Taiwan 10/09/13 1 Outlines SDN & NFV introduction Network Architecture Trend SDN Services

More information

Cisco NetFlow Generation Appliance (NGA) 3140

Cisco NetFlow Generation Appliance (NGA) 3140 Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance

More information

Cisco and Canonical: Cisco Network Virtualization Solution for Ubuntu OpenStack

Cisco and Canonical: Cisco Network Virtualization Solution for Ubuntu OpenStack Solution Overview Cisco and Canonical: Cisco Network Virtualization Solution for Ubuntu OpenStack What You Will Learn Cisco and Canonical extend the network virtualization offered by the Cisco Nexus 1000V

More information

1 COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

1 COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Welcome to this overview about Software-Defined Networking, or SDN, and Network Virtualization. This training course will not only provide the technical background to SDN, but will also show the value

More information

A Mock RFI for a SD-WAN

A Mock RFI for a SD-WAN A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

Extending Networking to Fit the Cloud

Extending Networking to Fit the Cloud VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at

More information

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization

Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization Gateway Use Cases for Virtual Networks with MX Series Routers 1 Table of Contents Executive Summary... 3 Introduction...4

More information

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...

More information

Course. Contact us at: Information 1/8. Introducing Cisco Data Center Networking No. Days: 4. Course Code

Course. Contact us at: Information 1/8. Introducing Cisco Data Center Networking No. Days: 4. Course Code Information Price Course Code Free Course Introducing Cisco Data Center Networking No. Days: 4 No. Courses: 2 Introducing Cisco Data Center Technologies No. Days: 5 Contact us at: Telephone: 888-305-1251

More information

Network Considerations to Optimize Virtual Desktop Deployment

Network Considerations to Optimize Virtual Desktop Deployment . White Paper Network Considerations to Optimize Virtual Desktop Deployment What You Will Learn Enterprises today strive to improve productivity, increase operating efficiency, and offer competitive advantages

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track** Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge

More information

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense

More information

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center

More information

Advanced Transportation Management Systems

Advanced Transportation Management Systems Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements

More information

Cisco and VMware Virtualization Planning and Design Service

Cisco and VMware Virtualization Planning and Design Service Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization

More information

Virtualized Network Services SDN solution for enterprises

Virtualized Network Services SDN solution for enterprises Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014 Simplify IT With Cisco Application Centric Infrastructure Barry Huang bhuang@cisco.com Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

Multitenancy Options in Brocade VCS Fabrics

Multitenancy Options in Brocade VCS Fabrics WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.

More information

Challenges and Opportunities:

Challenges and Opportunities: Challenges and Opportunities: The Rise of Software Centric Networking Nicolai Leymann Deutsche Telekom Technik 12.03.2015 Table of Contents 1. Todays networks and challenges 2. The New World: Software

More information

SDN Applications in Today s Data Center

SDN Applications in Today s Data Center SDN Applications in Today s Data Center Harry Petty Director Data Center & Cloud Networking Cisco Systems, Inc. Santa Clara, CA USA October 2013 1 Customer Insights: Research/ Academia OpenFlow/SDN components

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future

More information

Group Encrypted Transport VPN

Group Encrypted Transport VPN Group Encrypted Transport VPN Petr Růžička petr.ruzicka@cisco.com Cisco Systems Czech Republic V Celnici 10, 117 21 Praha Abstract Today's networked applications, such as voice and video, are accelerating

More information

Visibility into the Cloud and Virtualized Data Center // White Paper

Visibility into the Cloud and Virtualized Data Center // White Paper Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

Business Case for Open Data Center Architecture in Enterprise Private Cloud

Business Case for Open Data Center Architecture in Enterprise Private Cloud Business Case for Open Data Center Architecture in Enterprise Private Cloud Executive Summary Enterprise IT organizations that align themselves with their enterprise s overall goals help the organization

More information

Cisco Unified Access Technology Overview: Converged Access

Cisco Unified Access Technology Overview: Converged Access White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the

More information

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage

More information

Network Virtualization

Network Virtualization Network Virtualization Petr Grygárek 1 Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on shared physical infrastructure Total

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft White Paper Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft What You Will Learn Cisco is continuously innovating to help businesses reinvent the enterprise data

More information

When SDN meets Mobility

When SDN meets Mobility When SDN meets Mobility The result is an automated, simpler network that supports the way you work With wireless increasingly becoming the primary means of access for end users, it is essential that any

More information

Cisco Virtual Wide Area Application Services: Technical Overview

Cisco Virtual Wide Area Application Services: Technical Overview Cisco Virtual Wide Area Application Services: Technical Overview What You Will Learn Organizations are offering private and virtual private cloud-based application delivery over the WAN to their end users

More information

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture

More information

Dynamic Service Chaining for NFV/SDN

Dynamic Service Chaining for NFV/SDN Dynamic Service Chaining for NFV/SDN Kishore Inampudi A10 Networks, Inc. Agenda Introduction NFV Reference Architecture NFV Use cases Policy Enforcement in NFV/SDN Challenges in NFV environments Policy

More information

An Introduction to Service Containers

An Introduction to Service Containers An Introduction to Service Containers Matt Bolick Technical Marketing Engineer September 11, 2013 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Traditional Network Services Traditional

More information

Cisco IOS Software Release 15.0(1)SY1 New Features and Hardware Support

Cisco IOS Software Release 15.0(1)SY1 New Features and Hardware Support Product Bulletin Cisco IOS Software Release 15.0(1)SY1 New Features and Hardware Support PB696622 Cisco IOS Software Release 15.0(1)SY1 supports Cisco Catalyst 6500 Series Supervisor Engine 2T only. Release

More information

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT BROCADE SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT Rajesh Dhople Brocade Communications Systems, Inc. rdhople@brocade.com 2012 Brocade Communications Systems, Inc. 1 Why can t you do these things

More information

Cisco Virtual SAN Advantages and Use Cases

Cisco Virtual SAN Advantages and Use Cases Cisco Virtual SAN Advantages and Use Cases The Challenge Application data is accumulating at an increasingly fast pace, and to control costs, IT departments are looking at the benefits of economies of

More information

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM Presenter: Vinit Jain, STSM, System Networking Development, IBM System & Technology Group A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio

More information

CoIP (Cloud over IP): The Future of Hybrid Networking

CoIP (Cloud over IP): The Future of Hybrid Networking CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical

More information

Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26

Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 1 Outline Cloud data center (CDC) Software Defined Network (SDN) Network Function Virtualization (NFV) Conclusion 2 Cloud Computing Cloud computing

More information

Scalable Approaches for Multitenant Cloud Data Centers

Scalable Approaches for Multitenant Cloud Data Centers WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,

More information

Data Center Virtualization and Cloud QA Expertise

Data Center Virtualization and Cloud QA Expertise Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like

More information

How To Extend Security Policies To Public Clouds

How To Extend Security Policies To Public Clouds What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their

More information