SlideShare a Scribd company logo
Overlay Networks: Connecting and Protecting
Across Regions with Docker
Patrick Kerpan, CEO
© 2015
Agenda
2
Background: Cohesive and the cloud
Cloud Networking: Limitations
Overlay networks: To the rescue
Enter Docker: Opportunity in NFV
Future thinking: Overlay/NFV everywhere
Application Overlays: Who is the customer?
© 2015
Background: Cohesive and the cloud
3
© 2015 4
About Me
Patrick Kerpan
CEO, Cohesive Networks
@pjktech
BANKS

Recommended for you

Web rtc infrastructure the hard parts v4
Web rtc infrastructure the hard parts v4Web rtc infrastructure the hard parts v4
Web rtc infrastructure the hard parts v4

This document discusses the infrastructure challenges of WebRTC including network address translation traversal using TURN servers, media gateways for interworking between protocols, and media servers. Media servers are needed for conferencing, transcoding, server-side media processing for applications, security, and reliability. New approaches like selective forwarding units and simulcast aim to improve scalability of media distribution compared to traditional mesh-based conferencing. The document concludes that while terminating media on servers has costs, it is often necessary and architectures are evolving to make media processing more efficient.

What's Next for WebRTC
What's Next for WebRTCWhat's Next for WebRTC
What's Next for WebRTC

Panel presentation from the 2015 IIT-RTC Conference. Topics include: the new supermedia - 3D, AR, VR, realtime broadcast; talking to machines - streams from IoT devices and created between people because of them; middleware - the new glue that is emerging to stitch a real-time, high fidelity, contextual experiences together. Featuring slides from Brian Pulito from IBM, Douglas Wadkins from Skedans, Ivelin Ivanov from Telestax, Dr. Luis Lopez of Kurento, Vladimir Beloborodov of Mera Software and moderated by Chad Hart, independent consultant and Chief Editor at webrtcHacks.

iotwebrtchackswebrtc
Application delivery controllers
Application delivery controllersApplication delivery controllers
Application delivery controllers

T SOLUTION PROVIDERS IN INDIAA premium technology company. CUBIXTech is the leading company in India and Asia Pacific , compelling and complementing offerings with direct partnership with 10+ “Global Best of Breed” IT infrastructure Solution companies across the globe. Cubixtech Is One of the best IT Solution Provider in India. We have presence in 8 cities in India and serving more than 200 strong customers in the field of Telecom, BFSI, IT/ITes, Enterprise, Govt and Defence with focused teams addressing pre-sales, sales and post sales. Our overseas presence includes a International Purchase office at Singapore Global Clientele and Services at APAC , USA and Europe, Our engagement model is direct with the customers and our technical teams are one of the best in the industry. CUBIXTech is fast growing company and it has won many awards from Global OEMs on Asia Pacific level & One of the Top IT Solution Providers in India.

application delivery controllers
© 2015 5
2000+ customers in 20+ countries
•200+ Self Service Customers
•15+ SI Resellers
•30+ ISV OEM

Including Industry Leaders
•Global Mutual Fund Company
•Global ERP provider
•Global BPMS provider
•Global Cloud-basedThreat
Detection
•Global Fashion Brand
•Global Big Data Analytics Provider
Company 2000+ customers | 1 billion hours
© 2015
Cloud Networking: Limitations
6
© 2015
What can you control?
7
Limitations
Hypervisor You
Don’t Control
Layer 7


Layer 6
Layer 5
Layer 4
Layer 3
Layer 3
Layer 2
Layer1
Layer 0
Cloud Layer 3
Network
(minimal tenant features)
Limit of user access,
control and visibility
App 1 App 2
Cloud
Service
Provider
Cloud
Customer
Hardware
You Can’t
Get To
Application
Policies
You MUST
Control
© 2015
Most companies are NOT Google
8
Limitations
Google Inc., taking a new approach to enterprise security, is
moving its corporate applications to the Internet. In doing so, the
Internet giant is flipping common corporate security practice on
its head, shifting away from the idea of a trusted internal
corporate network secured by perimeter devices such as firewalls,
in favor of a model where corporate data can be accessed from
anywhere with the right device and user credentials.



The new model — called the BeyondCorp initiative —
assumes that the internal network is as dangerous as the
Internet.
(Wall Street Journal | “Google Moves Its Corporate Applications to the Internet” | May 11, 2015 )

Recommended for you

Monitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo LogicMonitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo Logic

Learn how to use Sumo Logic to monitor, diagnose, and troubleshoot your NGINX Plus instances in both Kubernetes and non-Kubernetes environments.

kubernetesnginxnginx kubernetes
Dedicated VNF Management - Why it's performance critical for PCRF
Dedicated VNF Management - Why it's performance critical for PCRFDedicated VNF Management - Why it's performance critical for PCRF
Dedicated VNF Management - Why it's performance critical for PCRF

Sue Koch shares her presentation from NFV World Congress, as she explains why it is performance-critical to have dedicated VNF management for PCRF. #NFVWorldCongress

nfvvoltevnf
Achieving real time voice and video virtualized network functionality in nfv
Achieving real time voice and video virtualized network functionality in nfvAchieving real time voice and video virtualized network functionality in nfv
Achieving real time voice and video virtualized network functionality in nfv

This presentation guides you through the critical points one needs to consider to achieve real-time voice and video virtualized network functionality in NFV.

technologyvirtualizationnfv
© 2015
Overlay networks: To the rescue
9
© 2015
Cloud overlay networking
10
Customer Data CenterCustomer Remote Office
VNS3 1
VNS3 2
VNS3 3
VNS3 Overlay Network
Subnet: 172.31.0.0/22
Overlay IP: 172.31.1.1 Overlay IP: 172.31.1.5 Overlay IP: 172.31.1.9 Overlay IP: 172.31.1.13 Overlay IP: 172.31.1.17 Overlay IP: 172.31.1.21
Cloud Server A Cloud Server B Cloud Server C Cloud Server D Cloud Server E Cloud Server F
Active IPsec Tunnel Active IPsec Tunnel
Failover IPsecTunnel
192.168.4.0/24 - 172.31.1.0/24192.168.3.0/24 - 172.31.1.0/24
Firewall / IPsec
Cisco 5505
Firewall / IPsec
Cisco 5585
Data Center ServerData Center Server
LAN IP: 192.168.4.50 LAN IP: 192.168.4.100User Workstation
LAN IP: 192.168.3.100
User Workstation
LAN IP: 192.168.3.50
Chicago, IL USA
Remote Subnet: 192.168.3.0/24
London, UK
Remote Subnet: 192.168.4.0/24
Public IP: 184.73.174.250
Overlay IP: 172.31.1.250
Public IP: 54.246.224.156
Overlay IP: 172.31.1.246
Public IP: 192.158.29.143
Overlay IP: 172.31.1.242
Peered Peered
US East 1 Europe US East
Overlay
Networks
© 2015
Overlay
Networks
11
ISV
North America
Partner/Customer Network
Improved solution vs. AWS Virtual Private
Gateway or physical data center with
legacy hardware.
ERP and CRM Company provided
secure SaaS solution for new and
existing customers using AWS.
25 million
Cloud Users
$3B Annual
Revenue
us-west-2 us-east-1
Customer
Overlay
Customer
Overlay
Customer
Overlay
Customer 1
Seattle, WA
Customer 3
San Francisco, CA
Customer 2
New York, NY
Customer
Overlay
Customer N
Service
Provider
DC
Data Center Server
Firewall / IPsec
Overlays extend networks
© 2015 12
Telecom Retail and Services company
productized mobile, fixed line and
broadband provisioning software as a
SaaS offering in AWS.
Europe
Secured all public and private VLAN
traffic for each customer deployment
allowing adherence to Data Protection
Standards.
Cloud WAN / Hybrid Cloud
$4.5B Mobile and Mobile
Related Revenues
Telecommunications
MVNO Infrastructure Overlay
Logical 1 Logical 2 Logical 3 Logical N
MVNO Carrier
MVNO Brand
CustomerCustomer
Topology per Customer
Overlays extend networksOverlay
Networks

Recommended for you

WebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: MediaWebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: Media

Discussion on handling WebRTC media: -What are the main reasons to terminate WebRTC media -Media server use cases in WebRTC -Client-side media processing vs. server-side trade-offs -Potential media services for today & tomorrow -Introduction to the Media Resource Broker (MRB) for scaling and orchestrating media servers/MRF -How media handling architectures are evolving & scaling for cloud/NFV networks

dialogicwebrtcmrf
DeveloperWeek 2015 - WebRTC - Where to start and how to scale
DeveloperWeek 2015 - WebRTC - Where to start and how to scaleDeveloperWeek 2015 - WebRTC - Where to start and how to scale
DeveloperWeek 2015 - WebRTC - Where to start and how to scale

This document provides an overview of WebRTC and considerations for implementing and scaling WebRTC applications. It discusses the WebRTC API, adding WebRTC to a first application, and various approaches for multi-party communication including peer-to-peer, mesh, Selective Forwarding Unit (SFU), and Multipoint Control Unit (MCU) architectures. It also covers related topics like signaling, NAT traversal using STUN and TURN servers, and testing for reliability at scale. The presentation aims to help developers understand where to start with WebRTC and how to address challenges involving media processing and bandwidth as applications grow in size and complexity.

powermediadeveloperweekwebrtc
Hybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM BluemixHybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM Bluemix

This document summarizes a presentation about hybrid messaging between on-premise systems and IBM Bluemix cloud services. The presentation discusses IBM Message Hub for scalable messaging in the cloud, connecting on-premise systems to Bluemix using Message Connect and Secure Gateway, and other approaches like running MQ in Docker containers. The goal is to enable organizations to leverage both their existing on-premise systems and Bluemix cloud services and applications through hybrid messaging architectures.

bluemixmqlightibm mq
© 2015
Enter Docker: Opportunity in NFV
13
© 2015 14
Isolated Docker containers within VNS3 allows Partners and Customers to
embed features and functions safely and securely into their Cloud Network.
Cohesive controls the integrity of the core appliance and overlay network,
while our customers and partners are free to innovate.
Proxy Reverse Proxy Content Caching Load Balancer IDS Custom Container
Router Switch Firewall
Protocol
Redistributor
VPN
Concentrator
Scriptable
SDN
VNS3 Core Components
Enter Docker Connected and secured with L4-L7 plug-in system
© 2015
Resource utilization “then” and “now”
15
Enter Docker
Tunnel Adapter
Cloud VM Adapter
Tunnel Adapter
Container 1
Container
Interface
Container 2
Container
Interface
HOST 1
Cloud VM Adapter
VNS3 Docker
Interface
VNS3 Docker
Interface
HOST 1
AWS m1.small c1.medium
or equivalent running L3 overlay
AWS m3.medium or larger
running L3 overlay plus customer
controlled L4-7 functions
2013 2015
© 2015
Connecting Docker containers via Overlay
16
Enter Docker
Send secure network traffic
from Container at 198.51.100.3
in AWS East to Container at
198.51.100.18 in AWS EU via
VNS3 encrypted routers.
Container 1
Container
Interface
HOST 1
Container 2
Container
Interface
Cloud VM Adapter
Tunnel Adapter
VNS3 Docker
Interface
Container 1
Container
Interface
HOST 2
Container 2
Container
Interface
Cloud VM Adapter
Tunnel Adapter
VNS3 Docker
Interface
AWS East AWS EU

Recommended for you

Implementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices InfrastructureImplementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices Infrastructure

This document discusses implementing Docker load balancing in microservices infrastructure. It describes how monolithic applications are being broken down into independent containerized microservices. Docker simplifies building and shipping these containerized applications. The document then discusses using Citrix NetScaler CPX and MAS to provide load balancing, traffic management, and network functions for containerized microservices. It provides examples of how NetScaler CPX and MAS can provide service discovery, certificate management, role-based access control, and logging/analytics for microservices.

citrixdockerdevsecops
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment

•Programmability in the network enables you to act and react, on demand, to operational and business events. •Automation of application deployment, device deployment, application reconfiguration, and support initiation can pay dividends immediately. •The ability to customise application services results in faster time to market, more innovation, and increased application ROI. For webinar-on-demand, please click: https://f5networks.webex.com/f5networks/lsr.php?RCID=247e21a15d3cea2fe1882ba466588586

programmabilityautomation
Beyond the MCU
Beyond the MCUBeyond the MCU
Beyond the MCU

Learn about why Mesh may not be the answer for #WebRTC and why the better approach is to centralize and mix all the media in an MCU. As well as an in-depth explanation on the benefits of using an MCU. As presented by Chad Hart at WebRTC Expo V.

webrtc; mcu; dialogic; networkfuel; mesh; transcod
© 2015
Adding NFV to Overlay: Totally Cool!
17
© 2015 18
Application segmentation via NFVEnter Docker
Topology per Customer
MVNO Infrastructure Overlay
Logical 1 Logical 2 Logical 3 Logical N
MVNO Carrier
MVNO Brand
CustomerCustomer
Container-based WAF at 

application edge.
© 2015 19
Application segmentation via NFVEnter Docker
Topology per Customer
MVNO Infrastructure Overlay
Logical 1 Logical 2 Logical 3 Logical N
MVNO Carrier
MVNO Brand
CustomerCustomer
Container-based NIDs in 

application interior

and edge.
© 2015
Application overlays: Who is the customer?
20

Recommended for you

Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015

In this presentation, Sean Chen shared Huawei's vision on NFV MANO products. As a result of years of telco experience, heavy R&D investment, as well as close collaborations with various customers, Huawei has strived to deliver an open platform that can be tailored to fit different customer's needs. Service agility recently has become the #1 driver for NFV adoption. Huawei's MANO products can help service providers to continue to deliver carrier-grade network services while enjoying the power of NFV.

nfvmanotelecom
Server-side WebRTC Infrastructure
Server-side WebRTC InfrastructureServer-side WebRTC Infrastructure
Server-side WebRTC Infrastructure

The document discusses considerations for server-side WebRTC infrastructure. It describes how WebRTC uses STUN and TURN servers to handle NAT traversal so clients can establish direct peer-to-peer connections. However, media servers and WebRTC gateways are also important to provide value-added functions like conferencing, recording, transcoding and interoperating WebRTC with existing VoIP networks. The document compares different approaches for multi-party video, including mesh, MCU, SFU and simulcast, and how servers can optimize resource usage for large scale conferencing.

natdialogic; networkfuel; signalling; webrtc
Fundamentals of microservices
Fundamentals of microservicesFundamentals of microservices
Fundamentals of microservices

On-Demand Link: https://www.nginx.com/resources/webinars/fundamentals-microservices/ About the Webinar Despite powering some of the most popular apps on the planet, microservices – including containers and Kubernetes – are still a mystery to many. Microservices is both an approach to software architecture that builds a large, complex apps from multiple small components and the term for the small components themselves. In this “Microservices 101” webinar, you’ll get an introduction to microservices that will give you a working understanding of the technologies: Monolithic, microservices, and hybrid architectures Containers and Kubernetes Ingress controllers and service meshes

microservicesnginx microservicesnginx
© 2015
Connect
*Application-specific L4-L7
not datacenter-centric
Connect
Encrypt
Firewall
Distribute
Segment
Secure*
Enterprise integrate
and optimize
Multi-tenant
Enterprise integrate

and optimize
Segment
Private Datacenter or
Cloud Infrastructure
Virtual Network
Cloud or Virtualized
Application Network
Application people driven by different motivations
© 2015
Future thinking: Cloud networks for all
22
© 2015
• IoT will not be “the Internet of things” - it will be “the
Internets of things”. Organizations may run an entire
IPv4 Internet overlay which “trunks” out on to the real
Internet. The things will be very wary of the trunk.
• Its called “the cloud” because it is so far away. Today’s
construction allows yielding to the temptation that the
hypervisor network will be able to do it all. Not a chance!
• “Your overlay is my underlay!” Intertwining overlays will be
projected ever farther out to the edge as all IoT devices
live in a fully virtualized world of (choose your metaphor)
Cat in the Hat computing, or Turtles All the Way Down.
Overlays and NFV - everywhere
23
Future Thinking
© 2015
• With the advent of server virtualization, the OS became part of
the application stack; hypervisor becomes new infra decision.
• Container “mania” sweeping the industry is another
manifestation of customers wanting “over the top” infrastructure
they control more completely than their public or private cloud
vendor.
• With the ability to do network virtualization, “A” network, not
“THE” network becomes part of the application stack - a network
dedicated to the needs of the application.
• Network overlays and NFV within them are part of the “over the
top” movement, allowing customers enhanced control and
security.
Conclusions
24

Recommended for you

The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...

WebRTC is finally cracking the enterprise market. Maturing standards and wider platform adoption are helping WebRTC to find its way into mission critical enterprise applications. Whether it\'s financials like American Express or smaller businesses looking for innovative ways to engage their customers, WebRTC is changing the way business views real-time communications. Conversational media is Big Data to the enterprise and extracting every ounce of insight from every customer interaction requires middleware that plays well with existing Systems of Engagement. Issues like enterprise application integration, federation, analytics and their related security models bring with it requirements that must be well understood to succeed in this market. This session will explore what middleware means to WebRTC and what you need to make it work both in the cloud or on premise.

analyticsiotsip
Revolutionising IT Agility
Revolutionising IT AgilityRevolutionising IT Agility
Revolutionising IT Agility

About the Webinar For years, forward-thinking business leaders have made agility a priority – or at least claimed as much. But the fact is many environments remain hampered by legacy systems. As businesses of all sizes look to accelerate their digital transformation, applications are the engines powering the digital economy. What is the current outlook for application services, and how are they enabling organisations to adapt to new realities and hardwire flexibility into their essence? Join this webinar to hear firsthand about challenges faced by organisations that wish to adapt to these new realities, and learn how development and operations teams can take advantage of the powerful capabilities of DevOps practices such as container orchestration and microservices.

nginxitdevops
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote

App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote About the talk: Customers don’t care where their cloud networks and infrastructure are, they just want apps to work. This session explains how overlay networks can help to do more networking at the IaaS level and how developers can build on top of overlay networking to extend traditional networks to the cloud.

© 2015
Appendix: How does it work?
25
© 2015
Resource utilization “then” and “now”
26
Enter Docker
Tunnel Adapter
Cloud VM Adapter
Tunnel Adapter
Container 1
Container
Interface
Container 2
Container
Interface
HOST 1
Cloud VM Adapter
VNS3 Docker
Interface
VNS3 Docker
Interface
HOST 1
AWS m1.small c1.medium
or equivalent running L3 overlay
AWS m3.medium or larger
running L3 overlay plus customer
controlled L4-7 functions
2013 2015
© 2015
More than just Layer 3 overlay
27
Enter Docker
Container 1
Container
Interface
HOST 1
Container 2
Container
Interface
Cloud VM Adapter
Tunnel Adapter
VNS3 Docker
Interface
Container 1
Container
Interface
HOST 2
Container 2
Container
Interface
Cloud VM Adapter
Tunnel Adapter
VNS3 Docker
Interface
Cloud 1 Cloud 2
© 2015
Connecting Docker containers with a single VM
28
Enter Docker
Send secure network traffic
from Container at 198.51.100.3
in AWS East to Container at
198.51.100.18 in AWS EU via
VNS3 encrypted routers.
Container 1
Container
Interface
HOST 1
Container 2
Container
Interface
Cloud VM Adapter
Tunnel Adapter
VNS3 Docker
Interface
Container 1
Container
Interface
HOST 2
Container 2
Container
Interface
Cloud VM Adapter
Tunnel Adapter
VNS3 Docker
Interface
AWS East AWS EU

Recommended for you

Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...

Defense in depth: practical steps to securing your data and achieving compliance Presented by Chris Purrington, the VP Sales Europe at Cohesive Networks Perimeter-based security approaches have not evolved to meet the modern application-focused enterprise. The weaknesses of the perimeter-based approach are on display in the east/west attacks on Sony, Target, and Home Depot exploits where hackers gained access to the perimeter, then ransacked the internal networks with minimal resistance. What can modern enterprises do? A “defense in depth” approach to security at the network layer. Enterprises must strengthen existing core networking hardware and virtualization layer security with added application security. In data centres, physical network isolation is not practical, and logical segmentation can be very difficult without using evolved networking approaches. As data centers became wholly virtualized and blur the line between data center and private cloud, we can finally add and control logical segmentation at the virtualization layer. This “Application Segmentation” provides the most comprehensive security model available today. You can apply application segmentation defense in depth using Cohesive Networks’ VNS3:turret. VNS3:turret creates a cryptographically unique micro-perimeter around each application topology. This presentation will examine how an defense in depth at the application layer can stop the next Sony attack.

app securitycloudsec 2016cloudsec16
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014

- Ryan Koop is the Director of Product & Marketing and Co-founder of CohesiveFT, a company that provides a virtual network security appliance called VNS3 that allows customers to connect and secure their cloud servers. - VNS3 virtualizes key network functions like routing, switching, firewall, and VPN to provide connectivity, integration and security for applications deployed in public clouds. - CohesiveFT is exploring using Docker containers to deploy the individual components of VNS3 for easier management and upgrading. This would package each VNS3 process within its own lightweight Docker container.

networkingcontainerized networkcloud computing
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptx

This document discusses F5 Distributed Cloud Services, which provides networking, security, and application delivery services across cloud, on-premises, and edge environments from a centralized SaaS console. It addresses challenges like complexity in coordinating technologies, automation, security across attack surfaces, and limited observability. The platform offers a unified view with centralized management, advanced security, full-stack observability, and automation. Use cases include hybrid/multi-cloud networking, web app and API protection, and running apps globally in cloud and edge. It is delivered via F5's global private network and provides value to DevOps, SecOps, and NetOps teams.

© 2015
Launch and configure container networks
29
• Setup Container Network on instance #1 as
198.51.100.0/28
• Setup container network on instance #2 as
198.51.100.16/28
Enter Docker
© 2015
Advertise container routes to controller network
30
• VNS3 Manager #1exposes a route to
container network #1 (198.51.100.0/28)
and VNS3
• Manager exposes a route to container
network #2 (198.51.100.16/28)
Enter Docker
© 2015
Configure ports and forwarding
31
Enter Docker
© 2015
Deploy Dockerfiles/LXC images, allocate containers
32
Enter Docker

Recommended for you

Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...

Chris Swan's CloudExpo Europe presentation "Keeping control when moving applications to the cloud" Chris Swan's CloudExpo Europe presentation originally given 27 Feb in the Cloud Management, Services and Applications Theatre. Keeping control when moving applications to the cloud

cloud computingoverlay networkingchris swan
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3

Learn more about overlay networks and cloud networking use cases with Cohesive Networks' VNS3 product family. Cohesive Networks provides a range of security and connectivity solutions for applications deployed to the public and private cloud, protecting them from exploitation by hackers, criminal gangs, and foreign governments. Over 1,000 customers have used our VNS3 security and network routing product family to build cloud-powered products and services on top of any cloud IaaS infrastructure. With VNS3, enterprises can extend networks into public, private and hybrid clouds to provide connectivity, integration and security for their applications. To find out more, visit www.cohesive.net

technologyvns3 use casescohesive networks
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn

if your are always confused about ip tunneling L2/L3 tunneling ipsec acces vpn u have to come to right place This presentation in pdf will get you started on right path towards tunnling concept & implementaion

© 2015
Containers are free to communicate
33
Enter Docker

More Related Content

What's hot

Peer-to-Server Media in WebRTC (Enterprise Connect 2014)
Peer-to-Server Media in WebRTC (Enterprise Connect 2014)Peer-to-Server Media in WebRTC (Enterprise Connect 2014)
Peer-to-Server Media in WebRTC (Enterprise Connect 2014)
Dialogic Inc.
 
Driving Success In The Cloud With NGINX
Driving Success In The Cloud With NGINXDriving Success In The Cloud With NGINX
Driving Success In The Cloud With NGINX
NGINX, Inc.
 
Deploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspectiveDeploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspective
Dialogic Inc.
 
Web rtc infrastructure the hard parts v4
Web rtc infrastructure the hard parts v4Web rtc infrastructure the hard parts v4
Web rtc infrastructure the hard parts v4
Dialogic Inc.
 
What's Next for WebRTC
What's Next for WebRTCWhat's Next for WebRTC
What's Next for WebRTC
Chad Hart
 
Application delivery controllers
Application delivery controllersApplication delivery controllers
Application delivery controllers
cubixtech
 
Monitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo LogicMonitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo Logic
NGINX, Inc.
 
Dedicated VNF Management - Why it's performance critical for PCRF
Dedicated VNF Management - Why it's performance critical for PCRFDedicated VNF Management - Why it's performance critical for PCRF
Dedicated VNF Management - Why it's performance critical for PCRF
Amdocs
 
Achieving real time voice and video virtualized network functionality in nfv
Achieving real time voice and video virtualized network functionality in nfvAchieving real time voice and video virtualized network functionality in nfv
Achieving real time voice and video virtualized network functionality in nfv
Dialogic Inc.
 
WebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: MediaWebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: Media
Dialogic Inc.
 
DeveloperWeek 2015 - WebRTC - Where to start and how to scale
DeveloperWeek 2015 - WebRTC - Where to start and how to scaleDeveloperWeek 2015 - WebRTC - Where to start and how to scale
DeveloperWeek 2015 - WebRTC - Where to start and how to scale
Dialogic Inc.
 
Hybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM BluemixHybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM Bluemix
matthew1001
 
Implementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices InfrastructureImplementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices Infrastructure
DevSecOpsSg
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
Christina Hoh
 
Beyond the MCU
Beyond the MCUBeyond the MCU
Beyond the MCU
Dialogic Inc.
 
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
Sean Chen
 
Server-side WebRTC Infrastructure
Server-side WebRTC InfrastructureServer-side WebRTC Infrastructure
Server-side WebRTC Infrastructure
Dialogic Inc.
 
Fundamentals of microservices
Fundamentals of microservicesFundamentals of microservices
Fundamentals of microservices
NGINX, Inc.
 
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
Brian Pulito
 
Revolutionising IT Agility
Revolutionising IT AgilityRevolutionising IT Agility
Revolutionising IT Agility
NGINX, Inc.
 

What's hot (20)

Peer-to-Server Media in WebRTC (Enterprise Connect 2014)
Peer-to-Server Media in WebRTC (Enterprise Connect 2014)Peer-to-Server Media in WebRTC (Enterprise Connect 2014)
Peer-to-Server Media in WebRTC (Enterprise Connect 2014)
 
Driving Success In The Cloud With NGINX
Driving Success In The Cloud With NGINXDriving Success In The Cloud With NGINX
Driving Success In The Cloud With NGINX
 
Deploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspectiveDeploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspective
 
Web rtc infrastructure the hard parts v4
Web rtc infrastructure the hard parts v4Web rtc infrastructure the hard parts v4
Web rtc infrastructure the hard parts v4
 
What's Next for WebRTC
What's Next for WebRTCWhat's Next for WebRTC
What's Next for WebRTC
 
Application delivery controllers
Application delivery controllersApplication delivery controllers
Application delivery controllers
 
Monitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo LogicMonitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo Logic
 
Dedicated VNF Management - Why it's performance critical for PCRF
Dedicated VNF Management - Why it's performance critical for PCRFDedicated VNF Management - Why it's performance critical for PCRF
Dedicated VNF Management - Why it's performance critical for PCRF
 
Achieving real time voice and video virtualized network functionality in nfv
Achieving real time voice and video virtualized network functionality in nfvAchieving real time voice and video virtualized network functionality in nfv
Achieving real time voice and video virtualized network functionality in nfv
 
WebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: MediaWebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: Media
 
DeveloperWeek 2015 - WebRTC - Where to start and how to scale
DeveloperWeek 2015 - WebRTC - Where to start and how to scaleDeveloperWeek 2015 - WebRTC - Where to start and how to scale
DeveloperWeek 2015 - WebRTC - Where to start and how to scale
 
Hybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM BluemixHybrid Messaging with IBM Bluemix
Hybrid Messaging with IBM Bluemix
 
Implementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices InfrastructureImplementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices Infrastructure
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Beyond the MCU
Beyond the MCUBeyond the MCU
Beyond the MCU
 
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
Carrier Grade MANO for Service Agility - Presented at NFV World Congress 2015
 
Server-side WebRTC Infrastructure
Server-side WebRTC InfrastructureServer-side WebRTC Infrastructure
Server-side WebRTC Infrastructure
 
Fundamentals of microservices
Fundamentals of microservicesFundamentals of microservices
Fundamentals of microservices
 
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
The Enterprise wants WebRTC -- and it needs Middleware to get it! (IIT RTC Co...
 
Revolutionising IT Agility
Revolutionising IT AgilityRevolutionising IT Agility
Revolutionising IT Agility
 

Similar to Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting Resources Across Regions with Docker"

App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
Cohesive Networks
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014
Ryan Koop
 
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptx
abenyeung1
 
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
Cohesive Networks
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
Cohesive Networks
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
Rajesh Porwal
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
DAVID RAUDALES
 
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretasExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
Inside_Marketing
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Olivia LaMar
 
F5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-CloudF5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-Cloud
abenyeung1
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
Cisco Canada
 
VMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public CloudVMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld
 
The Future of Service Mesh
The Future of Service MeshThe Future of Service Mesh
The Future of Service Mesh
All Things Open
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
BAKOTECH
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
GrigoryShkolnik1
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
VMworld
 
Presentation v mware virtualization & cloud vision 2010
Presentation   v mware virtualization & cloud vision 2010Presentation   v mware virtualization & cloud vision 2010
Presentation v mware virtualization & cloud vision 2010
solarisyourep
 

Similar to Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting Resources Across Regions with Docker" (20)

App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014
 
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptx
 
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
Chris Swan's CloudExpo Europe presentation "Keeping control when moving appli...
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretasExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
 
F5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-CloudF5 and HashiCorp Multi-Cloud
F5 and HashiCorp Multi-Cloud
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
VMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public CloudVMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
 
The Future of Service Mesh
The Future of Service MeshThe Future of Service Mesh
The Future of Service Mesh
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
Presentation v mware virtualization & cloud vision 2010
Presentation   v mware virtualization & cloud vision 2010Presentation   v mware virtualization & cloud vision 2010
Presentation v mware virtualization & cloud vision 2010
 

More from Cohesive Networks

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Cohesive Networks
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Cohesive Networks
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Cohesive Networks
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
Cohesive Networks
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
Cohesive Networks
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks
 

More from Cohesive Networks (20)

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
 

Recently uploaded

Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 

Recently uploaded (20)

Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 

Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting Resources Across Regions with Docker"

  • 1. Overlay Networks: Connecting and Protecting Across Regions with Docker Patrick Kerpan, CEO
  • 2. © 2015 Agenda 2 Background: Cohesive and the cloud Cloud Networking: Limitations Overlay networks: To the rescue Enter Docker: Opportunity in NFV Future thinking: Overlay/NFV everywhere Application Overlays: Who is the customer?
  • 4. © 2015 4 About Me Patrick Kerpan CEO, Cohesive Networks @pjktech BANKS
  • 5. © 2015 5 2000+ customers in 20+ countries •200+ Self Service Customers •15+ SI Resellers •30+ ISV OEM
 Including Industry Leaders •Global Mutual Fund Company •Global ERP provider •Global BPMS provider •Global Cloud-basedThreat Detection •Global Fashion Brand •Global Big Data Analytics Provider Company 2000+ customers | 1 billion hours
  • 7. © 2015 What can you control? 7 Limitations Hypervisor You Don’t Control Layer 7 
 Layer 6 Layer 5 Layer 4 Layer 3 Layer 3 Layer 2 Layer1 Layer 0 Cloud Layer 3 Network (minimal tenant features) Limit of user access, control and visibility App 1 App 2 Cloud Service Provider Cloud Customer Hardware You Can’t Get To Application Policies You MUST Control
  • 8. © 2015 Most companies are NOT Google 8 Limitations Google Inc., taking a new approach to enterprise security, is moving its corporate applications to the Internet. In doing so, the Internet giant is flipping common corporate security practice on its head, shifting away from the idea of a trusted internal corporate network secured by perimeter devices such as firewalls, in favor of a model where corporate data can be accessed from anywhere with the right device and user credentials.
 
 The new model — called the BeyondCorp initiative — assumes that the internal network is as dangerous as the Internet. (Wall Street Journal | “Google Moves Its Corporate Applications to the Internet” | May 11, 2015 )
  • 9. © 2015 Overlay networks: To the rescue 9
  • 10. © 2015 Cloud overlay networking 10 Customer Data CenterCustomer Remote Office VNS3 1 VNS3 2 VNS3 3 VNS3 Overlay Network Subnet: 172.31.0.0/22 Overlay IP: 172.31.1.1 Overlay IP: 172.31.1.5 Overlay IP: 172.31.1.9 Overlay IP: 172.31.1.13 Overlay IP: 172.31.1.17 Overlay IP: 172.31.1.21 Cloud Server A Cloud Server B Cloud Server C Cloud Server D Cloud Server E Cloud Server F Active IPsec Tunnel Active IPsec Tunnel Failover IPsecTunnel 192.168.4.0/24 - 172.31.1.0/24192.168.3.0/24 - 172.31.1.0/24 Firewall / IPsec Cisco 5505 Firewall / IPsec Cisco 5585 Data Center ServerData Center Server LAN IP: 192.168.4.50 LAN IP: 192.168.4.100User Workstation LAN IP: 192.168.3.100 User Workstation LAN IP: 192.168.3.50 Chicago, IL USA Remote Subnet: 192.168.3.0/24 London, UK Remote Subnet: 192.168.4.0/24 Public IP: 184.73.174.250 Overlay IP: 172.31.1.250 Public IP: 54.246.224.156 Overlay IP: 172.31.1.246 Public IP: 192.158.29.143 Overlay IP: 172.31.1.242 Peered Peered US East 1 Europe US East Overlay Networks
  • 11. © 2015 Overlay Networks 11 ISV North America Partner/Customer Network Improved solution vs. AWS Virtual Private Gateway or physical data center with legacy hardware. ERP and CRM Company provided secure SaaS solution for new and existing customers using AWS. 25 million Cloud Users $3B Annual Revenue us-west-2 us-east-1 Customer Overlay Customer Overlay Customer Overlay Customer 1 Seattle, WA Customer 3 San Francisco, CA Customer 2 New York, NY Customer Overlay Customer N Service Provider DC Data Center Server Firewall / IPsec Overlays extend networks
  • 12. © 2015 12 Telecom Retail and Services company productized mobile, fixed line and broadband provisioning software as a SaaS offering in AWS. Europe Secured all public and private VLAN traffic for each customer deployment allowing adherence to Data Protection Standards. Cloud WAN / Hybrid Cloud $4.5B Mobile and Mobile Related Revenues Telecommunications MVNO Infrastructure Overlay Logical 1 Logical 2 Logical 3 Logical N MVNO Carrier MVNO Brand CustomerCustomer Topology per Customer Overlays extend networksOverlay Networks
  • 13. © 2015 Enter Docker: Opportunity in NFV 13
  • 14. © 2015 14 Isolated Docker containers within VNS3 allows Partners and Customers to embed features and functions safely and securely into their Cloud Network. Cohesive controls the integrity of the core appliance and overlay network, while our customers and partners are free to innovate. Proxy Reverse Proxy Content Caching Load Balancer IDS Custom Container Router Switch Firewall Protocol Redistributor VPN Concentrator Scriptable SDN VNS3 Core Components Enter Docker Connected and secured with L4-L7 plug-in system
  • 15. © 2015 Resource utilization “then” and “now” 15 Enter Docker Tunnel Adapter Cloud VM Adapter Tunnel Adapter Container 1 Container Interface Container 2 Container Interface HOST 1 Cloud VM Adapter VNS3 Docker Interface VNS3 Docker Interface HOST 1 AWS m1.small c1.medium or equivalent running L3 overlay AWS m3.medium or larger running L3 overlay plus customer controlled L4-7 functions 2013 2015
  • 16. © 2015 Connecting Docker containers via Overlay 16 Enter Docker Send secure network traffic from Container at 198.51.100.3 in AWS East to Container at 198.51.100.18 in AWS EU via VNS3 encrypted routers. Container 1 Container Interface HOST 1 Container 2 Container Interface Cloud VM Adapter Tunnel Adapter VNS3 Docker Interface Container 1 Container Interface HOST 2 Container 2 Container Interface Cloud VM Adapter Tunnel Adapter VNS3 Docker Interface AWS East AWS EU
  • 17. © 2015 Adding NFV to Overlay: Totally Cool! 17
  • 18. © 2015 18 Application segmentation via NFVEnter Docker Topology per Customer MVNO Infrastructure Overlay Logical 1 Logical 2 Logical 3 Logical N MVNO Carrier MVNO Brand CustomerCustomer Container-based WAF at 
 application edge.
  • 19. © 2015 19 Application segmentation via NFVEnter Docker Topology per Customer MVNO Infrastructure Overlay Logical 1 Logical 2 Logical 3 Logical N MVNO Carrier MVNO Brand CustomerCustomer Container-based NIDs in 
 application interior
 and edge.
  • 20. © 2015 Application overlays: Who is the customer? 20
  • 21. © 2015 Connect *Application-specific L4-L7 not datacenter-centric Connect Encrypt Firewall Distribute Segment Secure* Enterprise integrate and optimize Multi-tenant Enterprise integrate
 and optimize Segment Private Datacenter or Cloud Infrastructure Virtual Network Cloud or Virtualized Application Network Application people driven by different motivations
  • 22. © 2015 Future thinking: Cloud networks for all 22
  • 23. © 2015 • IoT will not be “the Internet of things” - it will be “the Internets of things”. Organizations may run an entire IPv4 Internet overlay which “trunks” out on to the real Internet. The things will be very wary of the trunk. • Its called “the cloud” because it is so far away. Today’s construction allows yielding to the temptation that the hypervisor network will be able to do it all. Not a chance! • “Your overlay is my underlay!” Intertwining overlays will be projected ever farther out to the edge as all IoT devices live in a fully virtualized world of (choose your metaphor) Cat in the Hat computing, or Turtles All the Way Down. Overlays and NFV - everywhere 23 Future Thinking
  • 24. © 2015 • With the advent of server virtualization, the OS became part of the application stack; hypervisor becomes new infra decision. • Container “mania” sweeping the industry is another manifestation of customers wanting “over the top” infrastructure they control more completely than their public or private cloud vendor. • With the ability to do network virtualization, “A” network, not “THE” network becomes part of the application stack - a network dedicated to the needs of the application. • Network overlays and NFV within them are part of the “over the top” movement, allowing customers enhanced control and security. Conclusions 24
  • 25. © 2015 Appendix: How does it work? 25
  • 26. © 2015 Resource utilization “then” and “now” 26 Enter Docker Tunnel Adapter Cloud VM Adapter Tunnel Adapter Container 1 Container Interface Container 2 Container Interface HOST 1 Cloud VM Adapter VNS3 Docker Interface VNS3 Docker Interface HOST 1 AWS m1.small c1.medium or equivalent running L3 overlay AWS m3.medium or larger running L3 overlay plus customer controlled L4-7 functions 2013 2015
  • 27. © 2015 More than just Layer 3 overlay 27 Enter Docker Container 1 Container Interface HOST 1 Container 2 Container Interface Cloud VM Adapter Tunnel Adapter VNS3 Docker Interface Container 1 Container Interface HOST 2 Container 2 Container Interface Cloud VM Adapter Tunnel Adapter VNS3 Docker Interface Cloud 1 Cloud 2
  • 28. © 2015 Connecting Docker containers with a single VM 28 Enter Docker Send secure network traffic from Container at 198.51.100.3 in AWS East to Container at 198.51.100.18 in AWS EU via VNS3 encrypted routers. Container 1 Container Interface HOST 1 Container 2 Container Interface Cloud VM Adapter Tunnel Adapter VNS3 Docker Interface Container 1 Container Interface HOST 2 Container 2 Container Interface Cloud VM Adapter Tunnel Adapter VNS3 Docker Interface AWS East AWS EU
  • 29. © 2015 Launch and configure container networks 29 • Setup Container Network on instance #1 as 198.51.100.0/28 • Setup container network on instance #2 as 198.51.100.16/28 Enter Docker
  • 30. © 2015 Advertise container routes to controller network 30 • VNS3 Manager #1exposes a route to container network #1 (198.51.100.0/28) and VNS3 • Manager exposes a route to container network #2 (198.51.100.16/28) Enter Docker
  • 31. © 2015 Configure ports and forwarding 31 Enter Docker
  • 32. © 2015 Deploy Dockerfiles/LXC images, allocate containers 32 Enter Docker
  • 33. © 2015 Containers are free to communicate 33 Enter Docker