© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.

Slides:



Advertisements
Similar presentations
© Copyright 2007 Exempler Telecom Test Automation System Exempler - We pride ourselves with providing lightweight robust engineering solutions.
Advertisements

Presentation Title | Date | Page 1 Extracting Value from SOA.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© Copyright 2012 HP 1 Hoe uw netwerk afstemmen op de evolutie van uw datacenter? Raf Peeters, HP Geert De Ron, RealDolmen.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Presented by: Mike Silva. Who is Ipswitch Develop easy to use software for: Network Management Positioning 100 Million+ users in over 60 countries 10.
Customer Strategic Presentation March 2010
CA's Management Database (MDB): The EITM Foundation -WO108SN.
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
IT Analytics for Symantec Endpoint Protection
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
XProtect® Expert 2013 Product presentation
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Change Manager.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
EHealth Network Monitoring Network Tool Presentation J. Gaston Senior Network Design Seminar Professor Morteza Anvari 10 December 2004.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
MICROSOFT AZURE ISV PROFILE: D-SCOPE SYSTEMS D-Scope Systems is an enterprise-level medical media product and integration specialist company. It provides.
Increasing Manufacturing Uptime Is Made Easier with RtTech’s Industrial Facilities Application RtDuet, Powered by the Microsoft Azure Cloud MICROSOFT AZURE.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Leading provider of secure mobility for the enterprise Aruba MOVE Architecture Industry’s most secure WLAN Easiest BYOD & Guest Access Zero-touch.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
TACTIC | Workflow: Project Management OSS on Microsoft Azure Helps Enterprises to Create Streamline, Manage, and Track Digital Content MICROSOFT AZURE.
Open Spatial Adds Scalable Functionality to As Constructed Design Certification Validation Portal Using Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE:
+ Logentries Is a Real-Time Log Analytics Service for Aggregating, Analyzing, and Alerting on Log Data from Microsoft Azure Apps and Systems MICROSOFT.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
© 2015 LiveAction, Inc., All Rights Reserved. 1 AUTOMATION VISUALIZATION CONTROL LIVEACTION MANAGEMENT FOR CISCO INTELLIGENT WAN March 6, 2015.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Monitoreo y Administración de Infraestructura Fisica (DCIM). StruxureWare for Data Centers 2.0 Arturo Maqueo Business Development Data Centers LAM.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
DreamFactory for Microsoft Azure Is an Open Source REST API Platform That Enables Mobilization of Data in Minutes across Frameworks and Storage Methods.
Blue Coat Cloud Continuum
Instructor Materials Chapter 7: Network Evolution
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Microsoft Operations Management Suite Insight and Analytics
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Overview of SDN Controller Design
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Virtualization & Security real solutions
Replace with Application Image
Welcome! Power BI User Group (PUG)
Borderless Networks Services Supported
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Welcome! Power BI User Group (PUG)
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
MARMIND’s New Service Delivers a Single Centralized Marketing Plan That Connects Teams, Campaigns and Outcomes by Using the Power of the Azure Platform.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
SDN-based OmniRAN Use Cases Summary
7.3 Example Use Cases Spirent Automation Platform Technologies.
Presentation transcript:

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 2 Provide a Product that Requires NO programming to Utilize Focus on Real World Day0/1 Applications QOS, ACL, ZTD management. Basic visualization, interrogation, and decision making services that balances operations management simplicity gains with low risk adoption Ensure Product can Scale Out for large scale production network use Start with Brownfield Greenfield requires image updates that will complicate and delay evaluation start times and length.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Data CenterEnterpriseChanges from XNC Early Adoption Apps FocusDay 2Day 0/1Day 0/1 requires new services Programming TolerationModerateLowRequires Advanced GUI Network Device ManagementGreenfieldBrownfieldRequires CLI Southbound Interface ScalingUpOutRequires Elastic Infrastructure Northbound InterfacesJAVA/RES T RESTREST is common NBI architecture Multiprotocol SupportSAL SAL is common SBI architecture

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Enterprise Applications Enterprise Applications SAL REST APIs Enterprise Services Enterprise Services Inventory and State Inventory and State Identity and Location Identity and Location Application Awareness Application Awareness Policy Management Policy Management QoS Reserved ZTD ACL Elastic Infrastructure CLI Openflow Advanced Topology Management ENG Controller Services for Day0/1 Applications Day0/1 Applications Addresses Low Programming Tolerance Addresses Brownfield Support Addresses Scale Out Requirements

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Simplicity: Advanced Visualization Eliminates Network Admin SDN Programming Skills Gap UX toolkit allows network topologies to be viewed graphically Java/HTML enables network management using object oriented interfaces Programmability: Automated Policy Management Reduces Application Complexities Abstracting process management into controller ensures consistent behavior across applications Accelerates application development by reducing development load (content management only) Production Capable: Elastic Services Infrastructure Ensures Scaling as Adoption Grows Allows controller to service a wide array of applications and network sizes Ensures all production network requirements are met (H/A….) Justifiable Investments: Real World Applications Focus QOS, ACL, ZTD management are applications with identifiable metrics (OPEX savings, ROI) Provides low risk opportunity to adopt SDN

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Validate basic key controller services Validate basic application features (focus on visualization and interrogation) Determine use case-solutions next step requirements Learn about customer care-abouts for Deployment, Operational adoption etc. Serverx86 vCPU4 or Higher RAM16 or Higher OSLinux JavaVer(1.7) BrowserChrome (28.0 or later) HypervisorvSphere 5.x RoutersISR(1900, 2900, 3900), ASR1K Switches3850, 3850x, 2960s, 3560x, 3650 IOS/IOS-XELatest EFT -1 customers targeted: No of test bed devices supported: ~15

Thank you.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. ENG Controller Features

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 3D View Multiple Views with Zoom, Roping and other Web Application–Like Controls Network A Network B 2D View 3D View Constellation View CONFIDENTIAL HTML 5 Based Visualizer that Utilizes REST APIs User Defined Classifications with Group Tagging

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Inventory and State Network information base (NIB) that provides services and applications with a single source of truth for scanned network devices and their operational states Identity and Location Radius proxy for collecting user id and location (stored in NIB) Application Awareness Provides applications statistics by link Policy Management Provides consistent methodology across applications for analytics gathering, situation analysis, and policy decision making which can be enforced manually or programmatically

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Quick, easy and efficient discovery of network elements, key enabler for end to end network visualization Common distributed database(NIB) with detailed device level Inventory information for easier consumption by services and applications Single source of truth and information for all device related information obviates the need to go to network every time, saving time and resources Complete awareness and visibility of the overall operational health of the physical network, creating a single pain of glass view Enables real time network inventory and asset service management

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Important components in building secure network access service across wired, wireless and VPN networks Allows end point visibility with ability to track user Identity, location, in use devices and device health status from a single pane of glass Key enabler for building highly sophisticated policies Enables policy enforcement on a per user, per device and per location basis, allowing granular control of the network Identity information gathered from ISE and AAA server using pxGrid and Radius proxy functions respectively

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Fully automated enterprise application discovery, allows enterprises to have complete information about in use applications without costly resources Key enabler for creating fine grained access policies, required for controlling access at an atomic level i.e on a per user per application basis Creates lot of compelling business use cases such as per user application traffic tapping, DDoS traffic mirroring and priority markings etc. Important ingredient for building application level views of the network, creating number of useful applications such as network resource planning, SLA monitoring, compliance, troubleshooting etc

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Policy Manager Policy Manager QoS Manager QoS Manager ACL Manager ACL Manager ZTD Manage r ZTD Manage r Common Application-Interaction Constructs SAL Network Users Policy Actions Action Properties Content Management Process Management Application Development Scope Abstracting Process Management Enables Consistent Controller Behavior Across Applications and Lightens Application Development Load

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 QoS Manager Utilizes QoS policy templates as inputs to provide network view for interrogation, analysis, compliance, and policy change management ACL Manager Enables inspection, interrogation and analysis, and ACL change management including identification of conflicts and shadow ACLs. ZTD Enables any network device located anywhere in the network that with a recognizable IP address to be configured remotely