Cisco Tetration Analytics Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH
|
|
- Blaise Beasley
- 5 years ago
- Views:
Transcription
1
2 Cisco Tetration Analytics Demo Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH
3 Agenda Introduction Theory Demonstration
4
5 Innovation Through Engineering <9 Months spent on Planning $1B OPEX Shifts 25,000 $6.3B 30% of FY15 revenue are based on Agile and DevOps >1000 Employees on involved Open Source in Open Source Projects Projects Alpha 8Projects DLT members changing roles Engineering contributed Cisco Net Income growth of of 6% (Q3 15) Cisco Tetration Analytics 190 Tetration patents
6 Architecture POLICY ACI Intent (May) Traffic Analysis Lots of Data Configuration Analysis Very Large State- Space Analytics (Did) ADM Security Forensics Guarantees Compliance Consistency Assurance (Can) BRKDCN
7 Innovation Through Engineering <9 Months spent on Planning $1B OPEX Shifts 25,000 $6.3B 30% of FY15 revenue are based on Agile and DevOps >1000 Employees on involved Open Source in Open Source Projects Projects Alpha 8Projects DLT members changing roles Engineering contributed Cisco Net Income growth of 6% (Q3 15) Cisco Tetration Analytics 190 Tetration patents
8 Cisco Tetration Analytics Focus Areas Compliance Visibility and Forensics Cisco Tetration Analytics New Application Segmentation (Automated Policy Enforcement) Policy Application Insight TETRATION ANALYTICS 1.0 (Policy Recommendation) Action TETRATION ANALYTICS 2.0 (Application Segmentation)
9 Cisco Tetration Analytics Use Cases Application Insight and Dependency Automated Whitelist Policy Generation New Application Segmentation (Automated Policy Enforcement) Policy Simulation and Impact Assessment Policy Compliance and Auditability Forensics: Every Packet, Every Flow, Every Speed
10 Datacenter Wide Traffic Flow Visibility Detail information about the flow Information about Consumer Provider and type of traffic
11 You Can t Protect What You Don t See 60% 85% 54% of data is stolen in HOURS of point-of-sale intrusions aren t discovered for WEEKS of breaches remain undiscovered for MONTHS 51% increase in companies reporting a $10 million or more loss in the last 3 YEARS A community that hides in plain sight avoids detection and attacks swiftly. Cisco Security Annual Security Report.
12 Whitelist Policy Model
13 Whitelist Policy Recommendation Application Discovery Web Tier App Tier DB Tier Storage Storage Whitelist Policy Recommendation (Available in JSON, XML, and YAML) Policy Enforcement
14 Real-Time and Historical Policy Simulation BM BM BM Cisco Tetration Analytics Platform Validating policy impact assessment in real time Simulating policy changes over historic traffic View traffic outliers for quick intelligence Audit becomes a function of continuous machine learning
15 Policy Compliance BM BM BM BM Cisco Tetration Analytics Platform Identify policy deviations in real-time Review and update whitelist policy with one click Policy lifecycle management
16 The Real Value is Business and Operational Insight Increased Visibility Insightful Data Application Discovery (DC Network) Dependency Mapping (Security) Dependency Mapping (Migrations) Security Policy Enforcement Auditing Security Enforcement Policy Verification ~ what if Threat Detection / DDOS / Policy Discovery /Enforce/ Mgmt Visibility Flow Search Deviation Detection Policy Management Simulation and Impact Assessment Compliance
17 Tetration Analytics Architecture Overview Data Collection Analytics Engine Visualization and Reporting Host Sensors Tetration Telemetry Web GUI Network Sensors Cisco Nexus 92160YC-X Cisco Nexus 93180YC-EX Cisco Tetration Analytics Platform REST API 3rd-Party Metadata Sources Configuration Data Push Events
18 Tetration Analytics Data Sources Software Sensors Available Now Network Sensors Next Generation 9K switches Third Party Sources 3 rd party Data Sources Linux Windows Server Bare Metal (Linux and Windows Server) Universal* (Basic Sensor for other OS) Nexus 9200-X Nexus 9300-EX Asset Tagging Load Balancers IP Address Management CMDB *Note: No per-packet Telemetry, Not an enforcement point New! Enforcement Point (Software agents) Low CPU Overhead (SLA enforced) Low Network Overhead (SLA enforced) Highly Secure (Code Signed, Authenticated) Every Flow (No sampling), NO PAYLOAD
19 Application Discovery and Endpoint Grouping BM BM Bare-metal,, & switch telemetry BM Cisco Nexus 9000 Series Network-only sensors, host-only sensors, or both (preferred) BM BM Brownfield Bare-metal & telemetry Cisco Tetration Analytics Platform BM BM Bare metal and BM BM BM On-premises and cloud workloads (AWS) telemetry (AMI ) Unsupervised machine learning Behavior analysis BM BM
20 What does the Sensor Collect Application Process Process Process Information: Which process is it, who started it, etc. Device Information: Buffer/ACL Drops, etc. Application Process Process Sockets Transport Sockets Transport Network Network Network Network Data Link Data Link Data Link Data Link Physical Physical Physical Physical BRKDCN
21 Different Problems will need Different Data Sources Security, Application Troubleshooting Application Process Process Sockets Transport Network Data Link Physical Network Data Link Physical Application Heath, Performance, Monitoring, Discovery Network Heath, Performance, Monitoring, Capacity
22 Hardware Sensor and Software Sensor Software Sensor Process mapping Process ID Process owner Flow details Interpacket variations Hardware Sensor Tunnel endpoints Buffer utilization Burst detections Packet drops Accumulated Flow Information (Volume )
23 What We Discovered: To and From DVProd Database Internet Internet IP Storage NAS TA Cluster Hadoop Prod DBs Non-Prod DBs Labs Non-Production Databases LABs Kicker Infra APPs DB Proxy Monitoring APPs
24 Tetration Analytics and Before After Complex data center environment Lack of automation Lack of understanding into each tenant environment Exposure to risk of downtime too great to migrate applications safely Visibility across multi-tenant data center Move from tribal knowledge to data-driven decision making Reduction in time to understand application dependencies Migration to ACI with little downtime risk
25 Data Points Understanding of what happens INSIDE a flow Distributions (packet sizes, TCP windows ) Burstiness Anomaly detection Latency (application and network) VXLAN information High rate export capabilities 100ms for Hardware 1s for Software 35
26 Context Information What happens around this flow? Which process owns this flow? Who runs it? What are the buffer status? But also external information GeoDB, DNS, reputation lists 36
27 Collects the Meta-Data not the Packet Meta-Data Including Overlay VXLAN/GRE/IPinIP Encapsulated Header Ethernet Header IP Header UDP Header VXLAN Header Ethernet Header IP Header TCP Header Payload Ethernet Header IP Header TCP Header Payload Ethernet Header IP Header UDP Header Payload Privacy Risk
28 Sensor Technology Standard Sensors HW Sensors UniversalSensors RHEL (64 bit) 5.x,6.x,7.x CentOS (64 bit) 5.x,6.x,7.x Oracle Linux (64 bit) 6.x,7.x SUSE 11.2,11.3,11.4,12.1, 12.2 Ubuntu 12.04,14.04,14.10 Windows Server 2008 R1/R2 Essentials / Standard / Enterprise/DataCenter Windows Server 2012 R2/R2/Essentials/Standard/ Enterprise/DataCenter Cisco Nexus 9K Leave with: 92160YC-X 93180YC-EX Spine with: X9732C-EX C* Mainfarme Z (trial) AIX-ppc 5.3,6.1,7.1,7.2 (trial) Solaris (x86_64) RHL 4.x,5.x (31 bit -386/amd) CentOS 4.x, 5.x (32 bit) Windows XP,2003 (32 bit) Windows Server 2008 (32 bit)
29 Tetration Analytics: Deployment Options On-Premise Options Public Cloud Cisco Tetration Analytics (Large Form Factor) Suitable for deployments more than 1000 workloads Built in redundancy Scales up to 10,000 workloads Includes: 36 x UCS C-220 servers 3 x Nexus 9300 switches Cisco Tetration-M (Small Form Factor) Suitable for deployments under 1000 workloads Includes: 6 x UCS C-220 servers 2 x Nexus 9300 switches Cisco Tetration Cloud Software deployed in AWS Suitable for deployments under 1000 workloads AWS instance owned by customer Amazon Web Services
30 Tetration Analytics: Deployment Options On-Premise Options Public Cloud Cisco Tetration Analytics (Large Form Factor) Suitable for deployments more than 1000 workloads Built in redundancy Scales up to 10,000 workloads Includes: 36 x UCS C-220 servers 3 x Nexus 9300 switches Cisco Tetration-M (Small Form Factor) Suitable for deployments under 1000 workloads Includes: 6 x UCS C-220 servers 2 x Nexus 9300 switches Cisco Tetration Cloud Software deployed in AWS Suitable for deployments under 1000 workloads AWS instance owned by customer Amazon Web Services
31 Host Based Enforcement A trusted module inside the workload enforces your intent Workload Workload Workload Workload VLANs BDs Port Groups Interfaces Subnets EPGs Security Groups Security Groups ACLs Contracts Security Rules Security Rules 7K 5K 2K ACI Hypervisor AWS
32 Security Intent is rendered as security rules in native host firewalls Same level of security, any infrastructure. Process Application Denies Allows End Point Infrastructure
33 Virtual Process Application Process Application Denies Allows Denies Allows End Point End Point Bare metal Process Application Denies Allows End Point Network Infrastructure Hypervisor Virtual Network Network Infrastructure Any Infrastructure Any Networking Same Security Model Rich Context Cloud Process Application Denies Allows End Point Cloud Infrastructure
34 Mobility Intent stays with the endpoint, no matter the infrastructure it resides on EP EP VLANs Interfaces Subnets ACLs Tetration calculates all necessary rule changes and automatically applies Security Groups Security Rules 7K 5K 2K Cloud
35 Why should I understand dependencies? Identify a single point of failure that should be replicated Find all the parts of a service that should be migrated together to the cloud Replace infrastructure components of an undocumented application ACI application profiles, end point groups, and contracts based on applications 45
36 Application Dependency Mapping Load Balancer Database App 46
37 Understand the communication Load Balancer Database App 47
38 Initial recommendations Cache Database Load Balancer App 48
39 Optional and minimal human supervision Load Balancer Database Cache App 49
40 Approve the clustering Load Balancer Database App 50
41 Enforcement Anywhere Whitelist policy Cisco Tetration Analytics Data Whitelist policy { "src_name": "App", "dst_name": "Web", "whitelist": [ {"port": [ 0, 0 ],"proto": 1,"action": "ALLOW"}, {"port": [ 80, 80 ],"proto": 6,"action": "ALLOW"}, {"port": [ 443, 443 ],"proto": 6,"action": "ALLOW"} ] } Amazon Web Services Public Cloud Microsoft Azure Google Cloud Linux and Microsoft Windows Servers and Cisco ACI and Cisco Nexus 9000 Series Standalone Cisco ACI Traditional EGP/Contract Network ACL Integration via Cisco ACI Toolkit Firewall Rules Host Firewall Rules 51
42 Demo Time
43
Cisco Tetration Analytics + Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH
Cisco Tetration Analytics + Demo Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH Agenda Introduction Theory Demonstration Innovation Through Engineering
More informationSelf-driving Datacenter: Analytics
Self-driving Datacenter: Analytics George Boulescu Consulting Systems Engineer 19/10/2016 Alvin Toffler is a former associate editor of Fortune magazine, known for his works discussing the digital revolution,
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationPSOACI Tetration Overview. Mike Herbert
Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion
More informationCisco Tetration Analytics
Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics Christopher Say (CCIE RS SP) Consulting System Engineer csaychoh@cisco.com Challenges in operating a hybrid data center
More informationTetration Hands-on Lab from Deployment to Operations Support
LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate
More information2018 Cisco and/or its affiliates. All rights reserved.
Beyond Data Center A Journey to self-driving Data Center with Analytics, Intelligent and Assurance Mohamad Imaduddin Systems Engineer Cisco Oct 2018 App is the new Business Developer is the new Customer
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationEvolution of the Data Center
Cisco on Cisco Evolution of the Data Center Global Cloud Strategy & Tetration John Manville, SVP, Cisco IT Jon Woolwine, Distinguished Engineer, Cisco IT Benny Van de Voorde, Principal Engineer, Cisco
More informationTetration Analytics - Network Analytics & Machine Learning Enhancing Data Center Security and Operations
Tetration Analytics - Network Analytics & Machine Learning Enhancing Data Center Security and Operations Mike Herbert, Principal Engineer, INSBU BRKDCN-2040 Okay what does Tetration Mean? Tetration (or
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationCisco Tetration Platform: Network Performance Monitoring and Diagnostics
Data Sheet Cisco Tetration Platform: Network Performance Monitoring and Diagnostics The Cisco Tetration platform, extends machine learning capability to provide unprecedented insights into network performance
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco
More informationCisco IT Tetration Deployment, Part 1 of 2
Cisco IT ACI Deployment White Papers Cisco IT Tetration Deployment, Part 1 of 2 This is the fifth white paper in a series of case studies that explain how Cisco IT deployed ACI to deliver improved business
More informationCisco Tetration Platform
Data Sheet Cisco Tetration Platform The Cisco Tetration platform addresses data center operational and security challenges by providing comprehensive workload-protection capability and unprecedented insights
More informationCisco Tetration Platform
Data Sheet Cisco Tetration Platform The Cisco Tetration platform addresses data center operational and security challenges by providing comprehensive workload-protection capability and unprecedented insights
More informationIntuit Application Centric ACI Deployment Case Study
Intuit Application Centric ACI Deployment Case Study Joon Cho, Principal Network Engineer, Intuit Lawrence Zhu, Solutions Architect, Cisco Agenda Introduction Architecture / Principle Design Rollout Key
More informationSolution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and
Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and Compliance Management Through the integration of AlgoSec
More informationCisco Tetration Analytics, Release , Release Notes
Cisco Tetration Analytics, Release 2.3.1.41, Release Notes This document describes the features, caveats, and limitations for the Cisco Tetration Analytics software. The Cisco Tetration Analytics platform
More informationStop Cyber Threats With Adaptive Micro-Segmentation. Jeff Francis Regional Systems Engineer
Stop Cyber Threats With Adaptive Micro-Segmentation Jeff Francis Regional Systems Engineer Who is This Guy, and Why is He Here? Jeff Francis Regional Systems Engineer Northwestern United States Datacenter
More informationThe Why, What, and How of Cisco Tetration
The Why, What, and How of Cisco Tetration Why Cisco Tetration? With the above trends as a backdrop, Cisco has seen specific changes within the multicloud data center. Infrastructure is changing. It is
More informationIntroducing Cisco Network Assurance Engine
BRKACI-2403 Introducing Cisco Network Assurance Engine Intent Based Networking for Data Centers Sundar Iyer, Distinguished Engineer Head Cisco Network Assurance Engine Team Dhruv Jain, Director of Product
More informationArchitectural overview Turbonomic accesses Cisco Tetration Analytics data through Representational State Transfer (REST) APIs. It uses telemetry data
Solution Overview Cisco Tetration Analytics and Turbonomic Solution Deploy intent-based networking for distributed applications. Highlights Provide performance assurance for distributed applications. Real-time
More informationCisco SDN 解决方案 ACI 的基本概念
Cisco SDN 解决方案 ACI 的基本概念 Presented by: Shangxin Du(@shdu)-Solution Support Engineer, Cisco TAC Aug 26 th, 2015 2013 Cisco and/or its affiliates. All rights reserved. 1 Type Consumption Delivery Big data,
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationCisco Tetration Application Segmentation
Data Sheet Cisco Tetration Application Segmentation The Cisco Tetration platform using application insight and white-list based policy model, simplifies the implementation of zero-trust model. It enables
More informationCisco Application Centric Infrastructure
Data Sheet Cisco Application Centric Infrastructure What s Inside At a glance: Cisco ACI solution Main benefits Cisco ACI building blocks Main features Fabric Management and Automation Network Security
More informationDatacenter Security: Protection Beyond OS LifeCycle
Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000
More informationMulti-Cloud and Application Centric Modeling, Deployment and Management with Cisco CloudCenter (CliQr)
Multi-Cloud and Application Centric Modeling, Deployment and Management with Cisco CloudCenter (CliQr) Jeremy Oakey - Sr. Director, Technical Marketing & Integrations BRKCLD-2008 Agenda Introduction Architecture
More informationExploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer
Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide
More informationDevNet Technical Breakout: Introduction to ACI Programming and APIs.
DevNet Technical Breakout: Introduction to ACI Programming and APIs. Michael Cohen Agenda Introduction to ACI ACI Policy ACI APIs REST API Python API L4-7 Scripting Opflex 3 Application Centric Infrastructure
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationMP-BGP VxLAN, ACI & Demo. Brian Kvisgaard System Engineer, CCIE SP #41039 November 2017
MP-BGP VxLAN, ACI & Demo Brian Kvisgaard System Engineer, CCIE SP #41039 November 2017 Datacenter solutions Programmable Fabric Classic Ethernet VxLAN-BGP EVPN standard-based Cisco DCNM Automation Modern
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationCisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack
White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure
More informationCisco CloudCenter Solution with VMware
Cisco CloudCenter Solution with Extend, any application, and any cloud The Cisco CloudCenter hybrid cloud management platform securely provisions infrastructure resources and deploys application components
More informationMulti-Cloud and Application Centric Modeling, Deployment and Management with Cisco CloudCenter (CliQr)
Multi-Cloud and Application Centric Modeling, Deployment and Management with Cisco CloudCenter (CliQr) Jeremy Oakey Senior Director, Technical Marketing and Integrations Agenda Introduction Architecture
More informationHybrid Cloud Solutions
Hybrid Cloud Solutions with Cisco and Microsoft Innovation Rob Tappenden, Technical Solution Architect rtappend@cisco.com March 2016 Today s industry and business challenges Industry Evolution & Data Centres
More information主題 :Cisco Data Tetration Solution - 思科大數據維運解決方案 公司名稱 :Cisco Systems
主題 :Cisco Data Tetration Solution - 思科大數據維運解決方案 公司名稱 :Cisco Systems 主講人 : 大中華區數據中心事業部 首席技術顧問錢小山 Tetration 1 2 3 4 Addition Multiplication Exponentiation Tetration a + n = a + 1 + 1 +... + 1 n a x n = a
More informationCisco ACI vpod. One intent: Any workload, Any location, Any cloud. Introduction
Cisco ACI vpod One intent: Any workload, Any location, Any cloud Organizations are increasingly adopting hybrid data center models to meet their infrastructure demands, to get flexibility and to optimize
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationDeploy Next-Generation Cloud Applications on Apache Cassandra with Datos IO RecoverX on Cisco UCS and Cisco ACI
Deployment Guide Deploy Next-Generation Cloud Applications on Apache Cassandra with Datos IO RecoverX on Cisco UCS and Cisco ACI Executive Summary The Cisco Application Centric Infrastructure (Cisco ACI
More informationA10 HARMONY CONTROLLER
DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for
More informationThe Intent based Data Center. Kim In-Sook Manager, ASEAN Data Center Architect Team Jan 11, 2018
The Intent based Data Center Kim In-Sook Manager, ASEAN Data Center Architect Team Jan 11, 2018 30,000+ Application developers. 7200+ Apps. 32 data centers. More software developers than Google, and more
More information5 days lecture course and hands-on lab $3,295 USD 33 Digital Version
Course: Duration: Fees: Cisco Learning Credits: Kit: DCAC9K v1.1 Cisco Data Center Application Centric Infrastructure 5 days lecture course and hands-on lab $3,295 USD 33 Digital Version Course Details
More informationBuilding NFV Solutions with OpenStack and Cisco ACI
Building NFV Solutions with OpenStack and Cisco ACI Domenico Dastoli @domdastoli INSBU Technical Marketing Engineer Iftikhar Rathore - INSBU Technical Marketing Engineer Agenda Brief Introduction to Cisco
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationCisco UCS Director and ACI Advanced Deployment Lab
Cisco UCS Director and ACI Advanced Deployment Lab Michael Zimmerman, TME Vishal Mehta, TME Agenda Introduction Cisco UCS Director ACI Integration and Key Concepts Cisco UCS Director Application Container
More informationACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation)
This chapter contains the following sections:, on page 1 Alias API Inspector App Center Alias A changeable name for a given object. While the name of an object, once created, cannot be changed, the Alias
More informationDeploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework
White Paper Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework August 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
More informationMulti-Site Use Cases. Cisco ACI Multi-Site Service Integration. Supported Use Cases. East-West Intra-VRF/Non-Shared Service
Cisco ACI Multi-Site Service Integration, on page 1 Cisco ACI Multi-Site Back-to-Back Spine Connectivity Across Sites Without IPN, on page 8 Bridge Domain with Layer 2 Broadcast Extension, on page 9 Bridge
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationZentera Systems CoIP Platform
Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic
More informationCustomer s journey into the private cloud with Cisco Enterprise Cloud Suite
Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationCisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.
Cisco Enterprise Cloud Suite Overview 2015 Cisco and/or its affiliates. All rights reserved. 1 CECS Components End User Service Catalog SERVICE PORTAL Orchestration and Management UCS Director Application
More informationAutomation of Application Centric Infrastructure (ACI) with Cisco UCS Director
Automation of Application Centric Infrastructure (ACI) with Cisco UCS Director Raju Penmetsa @RajuPenmetsa1 Data Center Group Agenda IT Complexity Solution for ACI Automation Cisco UCS Director Application
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationVscale: Real-World Deployments of Next-Gen Data Center Architecture
Vscale: Real-World Deployments of Next-Gen Data Center Architecture Key takeaways Dell EMC Vscale is a standard, modular, pre-engineered architecture that transforms data centers into an automated, scalable
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationCisco Nexus Data Broker
Data Sheet Cisco Nexus Data Broker Product Overview You used to monitor traffic mainly to manage network operations. Today, when you monitor traffic you can find out instantly what is happening throughout
More informationData Center and Cloud Automation
Data Center and Cloud Automation Tanja Hess Systems Engineer September, 2014 AGENDA Challenges and Opportunities Manual vs. Automated IT Operations What problem are we trying to solve and how do we solve
More informationQualys Cloud Platform
18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform
More informationTrends and challenges Managing the performance of a large-scale network was challenging enough when the infrastructure was fairly static. Now, with Ci
Solution Overview SevOne SDN Monitoring Solution 2.0: Automate the Operational Insight of Cisco ACI Based Infrastructure What if you could automate the operational insight of your Cisco Application Centric
More informationCisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design
White Paper Cisco Application Centric Infrastructure (ACI) - Endpoint Groups (EPG) Usage and Design Emerging IT technologies have brought about a shift from IT as a cost center to IT as a business driver.
More informationPasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP
Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure
More informationSimplify and automate your network with Cisco DNA
Simplify and automate your network with Cisco DNA Mr. Brink Sanders Managing Director, Software and Network Transformation Cisco Asia Pacific and Japan March, 2017 Agenda Software-Defined Networking (SDN)
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationCisco ACI Virtual Machine Networking
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationSECURING THE MULTICLOUD
SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationCisco IT Compute at Scale on Cisco ACI
Cisco IT ACI Deployment White Papers Cisco IT Compute at Scale on Cisco ACI This is the fourth white paper in a series of case studies that explain how Cisco IT deployed ACI to deliver improved business
More informationCisco Container Platform
Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click
More informationCloudCenter for Developers
DEVNET-1198 CloudCenter for Developers Conor Murphy, Systems Engineer Data Centre Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationAutomate Application Deployment with F5 Local Traffic Manager and Cisco Application Centric Infrastructure
Automate Application Deployment with F5 Local Traffic Manager and Cisco Application Centric Infrastructure White Paper 2016 Cisco F5 Networks. All rights reserved. Page 1 Contents What You Will Learn...
More informationHow to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud
PRESENTED BY How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud BIG-IP enables the enterprise to efficiently address security and performance when migrating to
More informationCisco ACI Terminology ACI Terminology 2
inology ACI Terminology 2 Revised: May 24, 2018, ACI Terminology Cisco ACI Term Alias API Inspector App Center Application Policy Infrastructure Controller (APIC) Application Profile Atomic Counters Alias
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationMicrosegmentation with Cisco ACI
This chapter contains the following sections:, page 1 Microsegmentation with the Cisco Application Centric Infrastructure (ACI) provides the ability to automatically assign endpoints to logical security
More informationTrusted Cloud protects your critical data by ensuring that no unauthorised code can run undetected on your critical server infrastructure.
CyberHive s unique solution uses a combination of hardware-based cryptography and advanced whitelisting to protect servers from all unauthorised activity and malware in a way that conventional solutions
More informationData Sheet GigaSECURE Cloud
Data Sheet GigaSECURE Cloud Intelligent network traffic visibility that enables enterprises to extend their security posture to Microsoft The rapid evolution of Infrastructure-as-a-Service (IaaS) brings
More informationCisco SAN Analytics and SAN Telemetry Streaming
Cisco SAN Analytics and SAN Telemetry Streaming A deeper look at enterprise storage infrastructure The enterprise storage industry is going through a historic transformation. On one end, deep adoption
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More informationbelieve in more SDN for Datacenter A Simple Approach
believe in more SDN for Datacenter A Simple Approach 1 Agenda ACI Overview Fabric Policy Constructs Hypervisor Support A migra>on scenario One management umbrella: UCS Director Q&A 2 Applica,on Language
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured Our family of security and connectivity solutions, VNS3, protects cloud-based applications from exploitation by hackers, criminal
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationTaming the Multi-Cloud With Simplicity and Openness. Minh Dang Cisco Systems Vietnam 2018 January
Taming the Multi-Cloud With Simplicity and Openness Minh Dang Cisco Systems Vietnam 2018 January Multi-Cloud Challenge Growth in Applications and Infrastructure Many Operating Env COST Data Center Many
More informationCONTRAIL SECURITY. Contrail Cloud Networking & Security
CONTRAIL SECURITY Aniket Daptari Sr. Product Manager Contrail Cloud Networking & Security Scott Sneddon Senior Director Cloud and SDN This statement of direction sets forth Juniper Networks current intention
More informationService Graph Design with Cisco Application Centric Infrastructure
White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...
More informationCloudamize Agents FAQ
Cloudamize Agents FAQ Cloudamize is a cloud infrastructure analytics platform that provides data analysis and recommendations to speed and simplify cloud migration and management. Our platform helps you
More informationCLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY
CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers
More informationCisco ACI Virtual Machine Networking
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine
More informationSDN Security BRKSEC Alok Mittal Security Business Group, Cisco
SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined
More informationMcAfee Public Cloud Server Security Suite
McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,
More informationNetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures
BRKPAR - 2509 NetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures Jason Baudreau Achieving Agile Network Operations How Automation
More informationDesign Guide for Cisco ACI with Avi Vantage
Page 1 of 23 Design Guide for Cisco ACI with Avi Vantage view online Overview Cisco ACI Cisco Application Centric Infrastructure (ACI) is a software defined networking solution offered by Cisco for data
More information1V0-642.exam.30q.
1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized
More information