The networking declaration of independence
|
|
- Augustine Nicholas Horn
- 8 years ago
- Views:
Transcription
1 The networking declaration of independence How overlay networking gives you control of your networks Chris Swan, the original cloud networking company copyright
2 Agenda What is NFV? Declaration of Independence NFV Capabilities Preview: Waves of Adoption copyright
3 What is Network Function Virtualization? copyright
4 Positioning - NFV and SDN copyright
5 NFV can be a networking Swiss Army knife Application SDN (Software Defined Network) Appliances Allow control, mobility & agility by separating network location and network identity Control over end to end encryption, IP addressing and network topology NFV Hybrid Router Switch Firewall virtual device able to extend to IPsec/SSL VPN concentrator Protocol Redistributor Dynamic & Scriptable SDN multiple sites copyright
6 Networking Declaration of Independence copyright
7 Nicira s declaration of independence from metal, freed NFV from OpenFlow + %20The%20Seven%20Properties%20of%20Virtualization.pdf copyright
8 These same properties free NFV from the constraints of OpenFlow (technology, timing and target) Nicira defined the 7 Properties of network virtualization as: 1. Independence from network hardware 2. Faithful reproduction of the physical network service model 3. Follow operational model of compute virtualization 4. Compatible with any hypervisor platform 5. Secure isolation between virtual networks, the physical network, and the control plane 6. Cloud performance and scale 7. Programmatic networking provisioning and control copyright
9 Independence from network hardware Public Cloud Region 1 Overlay Network Cloud Server Overlay IP: xx Standard IPsec Tunnel Cloud Server NFV Firewall / IPsec Device IP: xx LAN Data Center Servers Customer Data Center With VM-based network devices you can use the cloud network as bulk transport and are indifferent to all else. copyright
10 Reproduction of physical network model Public Cloud Region 1 Overlay Network Cloud Server Cloud Server NFV Standard IPsec Tunnel Virtual Network Data Center Servers Data Center Servers Customer Data Center NFV devices look and feel like the same networking devices customers have used for ever, without boundaries copyright
11 Follow operational model of compute virtualization NFV NFV NFV NFV NFV functions can be dynamically brought on-line, up to the elastic limits of the total infrastructure available (!!) copyright
12 Compatible with any hypervisor platform Public Clouds Private Clouds Virtual Infrastructure NFV does more than follow the model of compute virtualization, it exists via compute virtualization. copyright
13 Secure isolation US East 1 EMEA APAC Overlay Network Subnet: /22 Cloud Server A Cloud Server B Cloud Server C Cloud Server D Cloud Server E Cloud Server F Overlay IP: Overlay IP: Overlay IP: Overlay IP: Overlay IP: Overlay IP: NFV Public IP: Overlay IP: Active IPsec /24 Tunnel /24 Firewall / IPsec Cisco 5505 Peered NFV Public IP: Overlay IP: Failover IPsec Tunnel Peered Public IP: Overlay IP: Active IPsec Tunnel / /24 Firewall / IPsec Cisco 5585 User Workstation User Workstation Data Center Server Data Center Server LAN IP: LAN IP: LAN IP: LAN IP: Customer Remote Office Chicago, IL USA Remote Subnet: /24 Customer Data Center London, UK Remote Subnet: /24 Isolation takes many forms: from underlying infra, allow my protocols, keep my chattiness in, keep others out, etc.. copyright
14 Cloud performance and scale NFV Data Center Server User Workstation User Workstation Where NFV really shines today: create a WAN in minutes, use cloud as points of presence for your business copyright
15 Programmatic networking provisioning & control Public Clouds Private Clouds + Virtual Infrastructure Cloud Compute and Network APIs + NFV Device APIs allow previously unimaginable flexibility and power copyright
16 Preview: Waves of Adoption copyright
17 Waves of NFV Adoption Tomorrow 11:25-11:50 in DCIM / Software Defined Datacentres and Networks Stream Public Cloud Region 1 Overlay Network Public Cloud Region 1 Overlay Network Encrypted Overlay network in VPC Cloud Server Overlay IP: xx Cloud Server Cloud Server Cloud Server Web App 1 Web App 2 Web App 3 Standard IPsec Tunnel NFV NFV Encrypted Connections Standard IPsec Tunnel Multiple IPsec Devices Firewall / IPsec Device IP: xx LAN Data Center Servers Customer Data Center Customer Site 1 Customer Site 2 Customer Site N Bursting and Containment Hubs and Spokes Winning back control copyright
18 Questions? Paddington, London, UK copyright
Waves of adoption for NFV
Waves of adoption for How public, private and hybrid cloud networking is used for real workloads Chris Swan, CTO @cpswan the original cloud networking company copyright 2014 1 Agenda What is? Bursting
More informationOverlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO
Overlay Networks: Connecting and Protecting Across Regions with Docker Patrick Kerpan, CEO Agenda Background: Cohesive and the cloud Cloud Networking: Limitations Overlay networks: To the rescue Enter
More informationUsing Docker in Cloud Networks
Using Docker in Cloud Networks Chris Swan, CTO @cpswan the original cloud networking company 1 Agenda Docker Overview Dockerfile and DevOps Docker in Cloud Networks Some Trip Hazards My Docker Wish List
More informationthe original cloud networking company Run your Business in the Cloud.
the original cloud networking company Run your Business in the Cloud. Agenda Company Overview Customers Market Overview VNS3 Product Line Summary Appendices What is an Overlay Network? Customer Use Cases
More informationVNS3 Secure Network Appliance Service Defnition for G-Cloud 7
VNS3 Secure Network Appliance Service Defnition for G-Cloud 7 What does VNS3:net do? VNS3:net secures your applications in the cloud. VNS3:net is a cloud native network, routing and security solution which
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationWhite Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
More informationWhat is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
More informationData Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair
Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing
More informationRIDE THE SDN AND CLOUD WAVE WITH CONTRAIL
RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS pgeenens@juniper.net BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services
More informationSoftware Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationUsing LISP for Secure Hybrid Cloud Extension
Using LISP for Secure Hybrid Cloud Extension draft-freitasbellagamba-lisp-hybrid-cloud-use-case-00 Santiago Freitas Patrice Bellagamba Yves Hertoghs IETF 89, London, UK A New Use Case for LISP It s a use
More informationWhite Paper. Cloud Security Best Practices. Part 1I: Layers of Control with VNS3. October 2014 Copyright Cohesive Networks
White Paper Part 1I: Layers of Control with VNS3 1 Introduction Public cloud offers elastic, scalable, highly available and accessible infrastructure for enterprises of all sizes. The 2014 Gartner Magic
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall Overview This document describes how to implement IPSec with pre-shared secrets
More informationLeveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
More informationHOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES
HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES Brian Levy CTO SERVICE PROVIDER SECTOR EMEA JUNIPER NETWORKS CIO DILEMA IT viewed as cost center
More informationOutline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture
OpenStack Neutron Outline Why Neutron? What is Neutron? API Abstractions Plugin Architecture Why Neutron? Networks for Enterprise Applications are Complex. Image from windowssecurity.com Why Neutron? Reason
More informationWhite Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationIPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks Renato Figueiredo Advanced Computing and Information Systems Lab University of Florida ipop-project.org Unit 3: Intra-cloud Virtual Networks
More informationHow To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
More informationOpenFlow/SDN for IaaS Providers
OpenFlow/SDN for IaaS Providers Open Networking Summit 2011 Stanford University Paul Lappas & Ivan Batanov The Public Cloud Our Definition Shared infrastructure operated by a service provider where no
More informationDigi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering
Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming
More informationThe promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services
The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationHow To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing
More informationSpotlight On Backbone Technologies
Spotlight On Backbone Technologies Shawn Stevens Technical Lead, Data Center Technologies CCIE #4618 shawn.stevens@cdw.com CDW.com/network 800.800.4239 Agenda Overview of Software-Defined Networking (SDN)
More informationNetwork Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
More information2013 ONS Tutorial 2: SDN Market Opportunities
2013 ONS Tutorial 2: SDN Market Opportunities SDN Vendor Landscape and User Readiness Jim Metzler, Ashton, Metzler & Associates Jim@ashtonmetzler.com April 15, 2013 1 1 Goals & Non-Goals Goals: Describe
More informationSDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
More informationNetwork Functions Virtualization in Home Networks
Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention
More informationEthernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
More informationStrategic Direction of Networking IPv6, SDN and NFV Where Do You Start?
Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start? Yanick Pouffary HP Distinguished Technologist, Chief Technologist Technology Services Mobility & Networking Forward-looking statements
More informationIT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery
IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the
More informationWhat is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
More informationBased on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.
30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V
More informationConfiguring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
More informationNetwork Virtualization Solutions
Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction
More informationNetScaler Cloud Bridge
WHITE PAPER Citrix NetScaler NetScaler Cloud Bridge Any-to-Any Access Across Public and Private Clouds www.citrix.com Contents Executive Summary... 3 The challenges for hybrid clouds... 4 NetScaler Cloud
More informationNetwork Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011
Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the
More informationEXINDA NETWORKS. Deployment Topologies
EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: info@exinda.com :: 2005 Exinda Networks Pty Ltd.
More informationF V CE. 2015 Brocade Communications Systems, Inc. PROPRIETARY INFORMATION 2
S D N F V CE S D N : Example Openflow F V CE 2015 Brocade Communications Systems, Inc. PROPRIETARY INFORMATION 2 SDN in the Data Center: Programmatic Control 50% reduction in SDN deployment cost Concurrent
More informationSDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
More informationSecuring The Hyper-Connected Cloud
Securing The Hyper-Connected Cloud Alvin Rodrigues, Market development director South East Asia and Hong Kong arodrigues@fortinet.com Copyright Fortinet Inc. All rights reserved. The rise of a new IOT
More informationTRANSFORMING NETWORKING WITH OPEN SDN. Jason Matlof, VP Marke1ng April, 2013
TRANSFORMING NETWORKING WITH OPEN SDN Jason Matlof, VP Marke1ng April, 2013 CLOSED & PROPRIETARY NETWORKING EQUIPMENT Ver1cally Integrated Systems Have Changed LiEle Over the Past 15 Years Feature 1 Feature
More informationview Point of OpenFlow is Software Defined Networking, Software Defined Networking is not only OpenFlow. Highlights
Point of view OpenFlow is Software Defined Networking, Software Defined Networking is not only OpenFlow. A look back at the roots of Software Defined Networking (SDN), our predictions for the future of
More informationVNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide
VNS3 to Cisco ASA Instructions ASDM 9.2 IPsec Configuration Guide 2016 Site-to-Site IPsec Tunnel IPsec protocol allows you to securely connect two sites together over the public internet using cryptographically
More informationSOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT
BROCADE SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT Rajesh Dhople Brocade Communications Systems, Inc. rdhople@brocade.com 2012 Brocade Communications Systems, Inc. 1 Why can t you do these things
More informationRemote Voting Conference
Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,
More informationCarrier/WAN SDN. SDN Optimized MPLS Demo
Carrier/WAN SDN SDN Optimized MPLS Demo Problem Statement! Service Providers around the world have large investments in highly sophisticated and feature rich IP/MPLS network infrastructures for providing
More informationSDN Architecture and Service Trend
2013 SDN 高 峰 論 壇 SDN Architecture and Service Trend Dr. Yu-Huang Chu Broadband Network Lab Chunghwa Telecom Co., Ltd., Taiwan 10/09/13 1 Outlines SDN & NFV introduction Network Architecture Trend SDN Services
More informationNetworking with Windows Server vb. Day(s): 5. Version: Overview
Networking with Windows Server vb Day(s): 5 Course Code: M10970 Version: B Overview Get hands-on instruction and practice implementing networking with Windows Server 2012 and Windows Server 2012 R2 in
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationBRINGING NETWORKS TO THE CLOUD ERA
BRINGING NETWORKS TO THE CLOUD ERA SDN enables new business models Aruna Ravichandran VICE PRESIDENT, MARKETING AND STRATEGY ARAVICHANDRAN@JUNIPER.NET SOFTWARE DEFINED NETWORKING (SDN), JUNIPER NETWORKS
More informationIntroduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
More informationEnterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges
A Custom Technology Adoption Profile Commissioned By Cisco Systems Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges January 2013 Introduction About half of US and European
More informationUSING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD ADOPTION
White Paper USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD ADOPTION Juniper-VMware Areas of Collaboration By: Daniel McGinniss, Juniper Networks Scott Lowe, VMware Copyright 2014, Juniper Networks,
More informationPalo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
More informationUsing IPsec VPN to provide communication between offices
Using IPsec VPN to provide communication between offices This example provides secure, transparent communication between two FortiGates located at different offices using route-based IPsec VPN. In this
More informationVPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide. http://www.peplink.com - 1 - Copyright 2015 Peplink
Peplink Balance http://www.peplink.com - 1 - Copyright 2015 Peplink Introduction Introduction Understanding Peplink VPN solutions Peplink's VPN is a complete, seamless system that tightly integrates your
More informationSoftware Defined Networks Virtualized networks & SDN
Software Defined Networks Virtualized networks & SDN Tony Smith Solution Architect HPN 2 What is Software Defined Networking Switch/Router MANAGEMENTPLANE Responsible for managing the device (CLI) CONTROLPLANE
More informationthe Data Center Connecting Islands of Resources Within and Across Locations with MX Series Routers White Paper
White Paper Integrating SDN into the Data Center Connecting Islands of Resources Within and Across Locations with MX Series Routers Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive
More informationVIRTUALIZING THE EDGE
VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks
More informationCisco QuickVPN Installation Tips for Windows Operating Systems
Article ID: 2922 Cisco QuickVPN Installation Tips for Windows Operating Systems Objective Cisco QuickVPN is a free software designed for remote access to a network. It is easy to install on a PC and simple
More informationSoftware AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing
Software AG and the AWS cloud Past, Present and Best Practices Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing Agenda How Software AG Uses The cloud Software AG s
More informationDesigning Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
More informationEthernet-based Software Defined Network (SDN)
Ethernet-based Software Defined Network (SDN) Tzi-cker Chiueh Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 Cloud Data Center Architecture Physical Server
More informationO p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s
EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION
More informationRoman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG
Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG North Core Distribution Access South North Peering #1 Upstream #1 Series of Tubes Upstream #2 Core Distribution Access Cust South Internet West
More informationNetwork Virtualization: Delivering on the Promises of SDN. Bruce Davie, Principal Engineer
Network Virtualization: Delivering on the Promises of SDN Bruce Davie, Principal Engineer What does SDN promise? The original* SDN promise was: Enable rapid innovation in networking Enable new forms of
More informationICAB5238B Build a highly secure firewall
ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required
More informationConfiguring TheGreenBow VPN Client with a TP-LINK VPN Router
Configuring TheGreenBow VPN Client with a TP-LINK VPN Router This chapter describes how to configure TheGreenBow VPN Client with a TP-LINK router. This chapter includes the following sections: Example
More informationIPsec VPN Application Guide REV: 1.0.0 1910010876
IPsec VPN Application Guide REV: 1.0.0 1910010876 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Configuration... 2 Chapter 3. Configuration... 5 3.1 Configure IPsec VPN on TL-WR842ND (Router A)...
More informationTechNote. Configuring SonicOS for Amazon VPC
Network Security SonicOS Contents Overview... 1 System or Network Requirements / Prerequisites... 3 Deployment Considerations... 3 Configuring Amazon VPC with a Policy-Based VPN... 4 Configuring Amazon
More informationSDN in CloudStack. Tuesday, October 15, 13
SDN in CloudStack About me» Hugo Trippaers Email: htrippaers@schubergphilis.com Twitter: @Spark404 Freenode: Spark404» http://www.schubergphilis.com CloudStack networking - the five minute version» CloudStack
More informationNetwork Function Virtualization & Software Defined Networking
Network Function Virtualization & Software Defined Networking Rencontres Inria Industrie «Télécoms du futur» 13 novembre 2014 Walid Dabbous Outline Network Functions Virtualization Software Defined Networks
More informationTransform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
More informationProactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
More informationSimplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
More informationConnecting Remote Offices by Setting Up VPN Tunnels
Connecting Remote Offices by Setting Up VPN Tunnels Cisco RV0xx Series Routers Overview As your business expands to additional sites, you need to ensure that all employees have access to the network resources
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationNetwork Softwarisation An Open Development Ecosystem. Telefónica I+D @ Global CTO 26-03-2015
Network Softwarisation An Open Development Ecosystem Telefónica I+D @ Global CTO 26-03-2015 We are evolving towards a Hyper Connected and Intelligent Digital World* The explosion of digital services makes
More informationVPN Tracker for Mac OS X
VPN Tracker for Mac OS X How-to: Interoperability with NETASQ Internet Security Appliances Rev. 3.0 Copyright 2003-2004 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction This document
More informationChris Dagney BROCADE Sr. Sales Engineer. January 23, 2014 ON DEMAND DATA CENTER
Chris Dagney BROCADE Sr. Sales Engineer January 23, 2014 ON DEMAND DATA CENTER AGENDA Introduction to Ethernet Fabrics What it can do for your customers Industry transition toward SDN Brocade s recent
More informationISG50 Application Note Version 1.0 June, 2011
ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,
More informationLab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
More informationUsing SDN-OpenFlow for High-level Services
Using SDN-OpenFlow for High-level Services Nabil Damouny Sr. Director, Strategic Marketing Netronome Vice Chair, Marketing Education, ONF ndamouny@netronome.com Open Server Summit, Networking Applications
More informationSOFTWARE DEFINED NETWORKING
WWW.WIPRO.COM SOFTWARE DEFINED NETWORKING SYSTEM INTEGRATORS PERSPECTIVE Amit Puri General Manager and Head of Presales - SIMS Manjari Sharma Intern, Global 100 Intern program Ramesh Padmanabhan Consulting
More informationSimplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014
Simplify IT With Cisco Application Centric Infrastructure Barry Huang bhuang@cisco.com Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow
More information(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure
(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure David Kernahan Senior Systems Engineer VMware Switzerland GmbH 2014 VMware Inc. All rights reserved. Agenda 1 VMware Strategy
More informationA Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
More informationLecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < echoi@brocade.com> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
More informationCLOUD ADOPTION AND IPV6 TRANSITION
CLOUD ADOPTION AND IPV6 TRANSITION Nephos6 Expertise and Experience Expertise Experience Co-Authored Books and Standards RFC 4779 RFC 5180 RFC 5375 RFC 5741 RFC 6105 Certifications CISSP CCSK CSCI VCP
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
More information