SlideShare a Scribd company logo
Brocade Software Networking
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Scott Sims
ssims@brocade.com
Data Center Journey over the Past Decade!
2
Consolidation Virtualization Convergence Cloud
New IP
Business Dynamics Act as a Catalyst for Network Change
2000 2010 20142007
Data Center
in a Rack
Today
New IP—Transformation of the Network
Enabling a new way of doing business
3
Technology Excellence
Open with a purpose
Innovation centric, software enabled
Ecosystem driven
Your own pace, your own way
Business Excellence
Unleash the Power of Network Today, to Be Future Ready
BUSINESS IT
Overview
Software-Defined Networking (SDN)
Network Function Virtualization (NFV)

Recommended for you

F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management

Presentación realizada por el Ing. Hugo Tovar en el Desayuno con F5 Networks el 18 de octubre de 2012.

Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela

Cisco's SD-WAN solution aims to address challenges facing the modern WAN and branch networks, including: - Increasing use of cloud services and bandwidth demands from more users, devices, and applications. - Need for flexible connectivity and transport independence beyond traditional MPLS-based WANs. - Requirements for application-aware policies for quality of experience, segmentation, and security across hybrid WAN transports. Cisco acquired Viptela to build upon their leading SD-WAN platforms and help customers innovate faster through a cloud-managed and feature-rich SD-WAN solution.

cisco connect edmonton 2018
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit

F5 Networks presentation on protocol normalization, given at OpenStack Summit 2016 in Barcelona, Red Hat NFV Mini Summit. Includes F5/Red Hat collaboration description.

nfvf5 networksred hat
Software Defined Networking (SDN)
A Programmable Network—Design, Build, Manage
5
Data Plane
Control Plane
Basic Network Services:
Topology Mgr, Switch Mgr, Host Tracker, Stats Mgr
Advantages
• Logically centralized view of
the overall network
• Improved interoperability
and manageability
• Enable users to develop and
deploy unique capabilities
for their network needs
REST APIs
Network protocols like OpenFlow
Applications and Orchestration Frameworks
Network Functions Virtualization (NFV)
6
Hardware Software
Router
VPN
Firewall
Advantages
• Virtualize the network
devices to create multiple
virtual functions for various
network appliances
• Enable service innovations
and meet service SLAs
• Reduce CAPEX/OPEX
Introduction to Brocade Software
Networking Solutions
Brocade SDN Controller
Leading open source SDN Controller—Part of open, modular portfolio
8
Designed for an open, multivendor world
• Each layer can be selected independently
• No platform or northbound dependencies
Simple on-ramp to SDN
• Low-risk investment protection
• Smooth installation and maintenance
Collaborative innovation
• Joint and custom app development
• Bridge to OpenDaylight community
Rapid Service Delivery
Brocade SDN Controller is an
open-source SDN Controller built
directly from OpenDaylight.

Recommended for you

VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP

The VIPRION® 2400 is a midrange chassis-based hardware platform. Adding to the successful F5® VIPRION product line, the new Application Delivery Controller (ADC) provides significant price/performance advantages for enterprises. In addition, F5's Virtual Clustered Multiprocessing (vCMP™) technology combines virtualization and multi-tenancy capabilities to help customers consolidate and efficiently manage application delivery services. Building on F5’s previously announced Clustered Multiprocessing (CMP™) technology, vCMP enables multiple instances of BIG-IP® software to run on one device.

f5 networks
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution

The document summarizes the BIG-IP data center firewall solution from F5 Networks. The solution has been certified by ICSA Labs as a network firewall and performs better than competitors. It defends against over 30 types of network attacks and DDoS attacks. The solution provides a unified security architecture combining firewall, web application firewall, DNS security, access management, and load balancing capabilities in a single device. It integrates with leading vulnerability scanning tools to allow for quick vulnerability assessment and remediation.

f5big-ipdata center
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real project

This document provides an overview and agenda for a presentation on implementing end-to-end quality of service (QoS) for VMware vSphere with NSX on Cisco UCS. It discusses the project requirements of guaranteeing network traffic for FCoE storage, vSphere management, vMotion and VM backups. It then presents three design options for implementing QoS by marking and prioritizing different classes of service on the virtual network interface cards, VMware distributed virtual switch port groups, Cisco UCS fabric interconnects and Nexus switches. The optimal solution must meet requirements within the constraints of the Cisco and VMware infrastructure components.

Brocade vRouter
Increase networking agility and connectivity with improved ROI
9
100M+
Production
Hours
Proven High Density with
Breakthrough Performance
Brocade vRouter is the first virtual router
capable of providing advanced networking
and security in software with scale, reliability,
and performance.
High ROI and efficiency
• Proven high VNF density of vRouters
in single server
• Low CPU consumption provides
headroom for other VNFs
Delivers breakthrough performance
• 80Gbps line rate on single vRouter
• Advanced enhancements with Intel DPDK
High versatility
• Single product, multiple functions for Cloud & SP
• Cloud network segmentation, Secure gateway services
and Workload and Subscriber firewall
Brocade Virtual Application Delivery Controller (vADC)
Fast, secure, available applications
10
Flexible Licensing for Enterprise
Capacity Management
Brocade Virtual Application Delivery Controller
(vADC) solutions help ensure predictable high-
performance for applications whenever and
wherever they are deployed.
Purpose-built for the Cloud
• Deploy in any Hybrid Cloud architectures
• On-demand application delivery—ADCaaS
• Established CSP partnerships—Azure, AWS,
Rackspace, Joyent, etc.
Process automation
• Easy, consistent deployment of Service templates (LBaaS) and
service isolation with centralized mgmt.
• Usage visibility—metering and billing capabilities
for chargeback
• Integration with key orchestration tools—OpenStack,
VMware NSX and Brocade SDN Controller
Hyperscale and Performance on Demand
• Highest Layer 7 throughput for software (50GB/node)
• Unique web application security solution
The Brocade vADC Family
A Comprehensive Approach To Application Delivery
11
• Load Balancer / Traffic Manager / ADC
• Provides reliability, availability, offload,
security, scripting, and more
• Traffic Script
• Web Application Firewall
• Defends your web applications against
Layer-7 attacks
• Elastic and adaptive services
director
• Automates licensing, &
metering of ADC services
• Disruptive licensing model
Services Director
VirtualTraffic Manager
VirtualWeb Application Firewall
Web Acceleration
• Web acceleration
• Image and content compression and
caching
Brocade Services Director
• Enterprise capacity management
• Unique Capacity Pooling Provides Unmatched Flexibility and Scalability
12

Recommended for you

Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX

Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include: - How SDN allows for innovative ways to use a virtualized network - Why SDN creates greater span of control, network analytics and response - What intelligence can be gained from a global view of the network - How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ

vmwaregtrivirtualization
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan

Faced with the dual threats of rising operating costs and declining revenues, network service providers are increasingly turning to network functions virtualization (NFV) to help them keep up with constantly changing market conditions. In a virtualized Telco environment, service providers can deploy and deliver new network functions, services and capacity on demand—reducing normal rollout time from months and weeks to just hours. Leveraging the principles of cloud computing, network service providers can deliver a level of responsiveness never before available, easily scaling capacity up or down to meet the evolving needs of their subscribers. The result is a highly agile system that allows new revenue-generating services to be quickly developed, exhaustively tested and selectively rolled out to targeted groups in a fraction of the time and at a much lower cost than previously thought possible. In this session, the speaker will present how the solution from Juniper networks look like and how it can be deployed by service provider to improve their agility in delivering services to their customers.

nogidnog02nfv
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...

This document provides an overview and agenda for a presentation on integrating VMware NSX and vCloud Automation Center. It discusses how the integration enables dynamic configuration and deployment of NSX logical networking and security services through vCloud Automation Center. Key features covered include network profiles for different application topologies, microsegmentation using security groups, applying firewall and security policies, and load balancing. The integration leverages the new NSX vCenter Orchestrator plugin to abstract workflows and make them more extensible.

automationtechnicalvcloud
Making Capacity and Resource Mgmt Easy
 Unique usage-based
licensing model
 Dynamic resource and
capacity allocation for
changing workload
 Drill down to usage reports
and export billing data for
chargeback
Resource and
Services View
Capacity
Allocation View
Services, Catalogue,
Diagnostic, Active,
and Systems View
Brocade Virtual Traffic Manager
• High Performing L7 Based Load Balancing
• Automated/orchestrated ADCaaS solution
14
In the Beginning:
Direct Client/Server
You Need Scale and Availability
Huge increase in users Apps are always up and running
…
…
…
ADC Per App Architecture
Unmatched Ability to Cluster
15
Improved performance and reliability
Even better performance and reliability
BROCADE’S ABILITY TO CLUSTER.
•
•
•
•
•
Web Application Firewall

Recommended for you

Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center

This document discusses simplifying security in the data center. It introduces concepts like micro-segmentation using Endpoint Groups (EPGs) in Cisco Application Centric Infrastructure (ACI) to isolate application traffic. It also discusses integrating ACI with Cisco TrustSec to apply common identity and security policies between the campus and data center domains. Finally, it demonstrates how the Cisco Firepower management center can be used to automate a security feedback loop, moving compromised endpoints to a quarantined EPG for remediation through REST API calls to ACI.

ottawa dc dec 6
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center

This document provides an agenda and overview of Cisco Contact Center features, including: - Introduction to Cisco Contact Center Express, Finesse desktop experience, omnichannel capabilities with Cisco Context Service, and CUIC reporting. - Details on the Finesse desktop elements, features in Finesse 11.5 like customizable gadgets and multichannel media control, as well as support for web chat, email, outbound capabilities, and IP phone agent functionality. - Timelines for CAD EOL and information on mixed mode deployments with Finesse, supported phones for IPPA, and an introduction to Cisco's Digital Contact Center vision around omnichannel experiences.

cisco ottawa collaboration
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...

The document discusses Cisco Spark security features for cloud and on-premises collaboration. It covers Cisco Spark elements, identity management using SAML and OAuth, encrypting and securing messages and files both in the cloud and on-premises using hybrid data security. It also discusses secure search, e-discovery, and partnerships with compliance vendors.

cisco connect toronto 2017
TCP
IP
Business
Logic
HTTP
Web App
Firewall
Business
Logic
HTTP
TCP
IP
Network Firewall
Business
Logic
HTTP
TCP
IP
Reverse Proxy
Traditional network firewalls:
• Operate at TCP/IP level
• Opening/closing ports
Reverse proxies, next-gen firewall and DPI
• Allows / blocks users and applications, traffic
patterns
• Limited view of business logic
• Fails PCI DSS requirement
Web application firewalls look beyond
TCP/IP
into application-level security:
• Business logic inspection
• HTTP content
• Dual-mode “Detect & Protect” security
Network firewalling has become commodity, the trend has been to move
to application layer attacks
Source: 10.1.1.42:3231
Destination: 192.168.1.12:80
Sequence Number: 32234
POST /Account/Profile
Host: www.onlinebank.com
Cookie: Sessionid = 172347
Action=transfer_mon
ey&from_account=1
3654&to_account=3
2165&amount=1000
USD
Brocade Web Application Firewall
• A scalable, application-aware Layer 7 security solution
• Offers highest protection and performance in web and cloud application security
• Allows customers to mitigate web application security threats in a scalable manner
• Distributed WAF
18
Web Applications
Hacker
User
vWAF
Brocade Web Application Firewall
•
•
•
•
Web Accelerator
19
20
Web applications present unique challenges…
A 1-second delay in page load time
7% loss in conversions
11% fewer page views
16% decrease in
customer satisfactionIf your site earns $200,000 per day, you
could lose up to $5M in annual sales
Source: Aberdeen group

Recommended for you

Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN

NetScaler SD-WAN provides software-defined wide area networking and cloud access capabilities that are secure, reliable and ensure high application quality. It offers various editions with standard features including bonding multiple WAN circuits into a single logical circuit, monitoring link conditions, and delivering applications over the best circuit. The product provides centralized configuration and management without requiring branch configurations.

Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...

- Service Templates - Zero Touch Provisioning - Lifecycle Management - Analytics & Monitoring ENCS 5000 Series Hardware Platform - High Performance Intel/AMD CPUs - Integrated Switching & Storage - Modular I/O Options - Rack & Desktop Models VMS Managed Services - Virtual Router (ISRv) - Virtual Firewall (ASAv) - Virtual WAN Optimization (vWAAS) - Virtual Wireless LAN (vWLC) - Third Party VNFs Cisco NFVIS - Docker Containerization - Kubernetes Cluster Management - Plug-n-Play Provisioning - Embedded Linux OS ENCS

cisco connect calgary 2018
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained

The document discusses authentication and authorization in Cisco Spark cloud and hybrid deployments. It covers key concepts like identity management, SAML and OAuth authentication flows, encryption of messages and content, secure search indexing, and e-discovery. Hybrid data security is also explained, where encryption keys, search indexing, and e-discovery services are hosted on-premises rather than in the cloud. Maintaining encryption keys on-premises provides additional security but also responsibilities if keys are lost.

cisco connect calgary 2018
Automate Web Performance best Practices
Dynamic
Layout
Compress
• JavaScript & Stylesheet shrinking
• Image resampling
• Metadata removal
• Dynamic Gzip/deflate compression
• JavaScript/Stylesheet re-ordering
• Removal of missing and duplicate content
• Browser aware optimizations (Desktop, Mobile and legacy browsers )
Cache
• On-Proxy resource caching
• Dynamic page caching
• Aggressive Browser caching
• Auto URL versioning
Combine
• Merge Stylesheets
• Image Spriting
• Background image inlining
Automates web performance best practices, so you can focus on
strategic development & content
Examples of where to leverage vADCaaS
22
Enterprise
Apps
“It handles all our traffic with no problem, and the fact that I don’t have to do much with it is very
very important. With all the other stuff on my plate, not having to constantly watch over the load
load balancer is huge.”
— Chris Loughlin, Citrix Certified Administrator and Epic Client Systems Manager
Virtual
Datacenter
“With Brocade vTM now in place, everything is virtual. We just click a button and it happens in a
very predictable and easily configurable manner.
- Yoni Kirsh, managing director of Fastrack Technology
E-Retail
“With a faster website, the number of page views increased, which naturally led to higher
conversion rates and an increase in orders.”
— Lionel Touati, online sales technical director at Maisons du Monde
Online
Media &
Games
“The Brocade Virtual Traffic Manager does exactly what it’s supposed to do, and everything that
we need it to do.”
— Greg Birdwell, infrastructure architect at BARBRI
Developer
Teams
“We never know what a customer may want to implement next, but we know with TrafficScript
we are ready for any future implementation.”
— Josh Allen, Web Operations Infrastructure Engineer at CoSentry
What You Can Achieve with Brocade vADC
23
Capacity Planning
10x Faster Provisioning
Up to 90% Greater ROI
Automated Service Management
Enterprise Licensing
Call to Action…Take the First Step Today
Brocade.com Product Pages
– Brocade Virtual Application Delivery Controller (vADC)
– Brocade vRouter
– Brocade SDN Controller
FREE Trial Software Downloads
– Brocade vADC
– Brocade vRouter
– Brocade SDN Controller
Book Demo or POC
– Contact Scott Sims: ssims@brocade.com / 972-567-4756
24

Recommended for you

VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases

This document provides an overview of VMware NSX for vSphere and its use cases. It discusses how NSX addresses barriers to creating a software defined data center by providing network virtualization. It allows network provisioning in seconds, increased compute utilization up to 90%, and cost savings up to 80%. Use cases described include deploying applications from a cloud management platform within logical networks with isolation and micro-segmentation for improved network security.

cloudnsxvxlan
VMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
VMworld 2014: vCloud Hybrid Service Networking Technical Deep DiveVMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
VMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive

VMware vCloud Hybrid Service provides networking services including IPsec VPN connectivity, direct connect options, and network address translation capabilities. Customers can connect their on-premises networks to vCloud Air through various connectivity methods and extend their internal IP addressing schemes. The presentation also discusses load balancing, firewall, and intrusion detection options for securing multi-tier applications on vCloud Air. Disaster recovery with vCloud Air aims to maintain the same network configurations across sites.

2014technicalhybrid
OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For?

OpenFlow: What is it Good For?, by Pete Moyer. A presentation given at APRICOT 2016’s Software Defined Networking session on 24 February 2016.

apnicapricot2016
Thank you
25

More Related Content

What's hot

Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Canada
 
PCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-T
PCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-TPCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-T
PCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-T
VMware Tanzu
 
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
SkillFactory
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
AEC Networks
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Cisco Canada
 
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
kimw001
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
F5 Networks
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
F5 Networks
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real project
David Pasek
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
Zivaro Inc
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
Indonesia Network Operators Group
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
Cisco Canada
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
Cisco Canada
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Canada
 
Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN
MarketingArrowECS_CZ
 
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Cisco Canada
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
Cisco Canada
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
VMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
VMworld 2014: vCloud Hybrid Service Networking Technical Deep DiveVMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
VMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
VMworld
 

What's hot (20)

Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
 
PCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-T
PCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-TPCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-T
PCF in the Land of NSX: A Closer Look at PCF with NSX-V vs. NSX-T
 
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real project
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
 
Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN
 
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
VMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
VMworld 2014: vCloud Hybrid Service Networking Technical Deep DiveVMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
VMworld 2014: vCloud Hybrid Service Networking Technical Deep Dive
 

Viewers also liked

OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For?
APNIC
 
Implementing MPLS Services using Openflow
Implementing MPLS Services using OpenflowImplementing MPLS Services using Openflow
Implementing MPLS Services using Openflow
APNIC
 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
NAIM Networks, Inc.
 
Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)
SDNRG ITB
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
openflow
 
Brocade SDN Controller -Sample Code for Brocade vRouter-
Brocade SDN Controller -Sample Code for Brocade vRouter-Brocade SDN Controller -Sample Code for Brocade vRouter-
Brocade SDN Controller -Sample Code for Brocade vRouter-
Brocade
 
Ryu sdn framework
Ryu sdn framework Ryu sdn framework
Ryu sdn framework
Isaku Yamahata
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
SDNRG ITB
 

Viewers also liked (8)

OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For?
 
Implementing MPLS Services using Openflow
Implementing MPLS Services using OpenflowImplementing MPLS Services using Openflow
Implementing MPLS Services using Openflow
 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
 
Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
 
Brocade SDN Controller -Sample Code for Brocade vRouter-
Brocade SDN Controller -Sample Code for Brocade vRouter-Brocade SDN Controller -Sample Code for Brocade vRouter-
Brocade SDN Controller -Sample Code for Brocade vRouter-
 
Ryu sdn framework
Ryu sdn framework Ryu sdn framework
Ryu sdn framework
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 

Similar to Brocade Software Networking Presentation at Interface 2016

ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
RENJITHKNAIR5
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
centralohioissa
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
MarketingArrowECS_CZ
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11
Dileep Bhandarkar
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB
 
Cloud computing case studies with ProfitBricks IaaS
Cloud computing case studies with ProfitBricks IaaSCloud computing case studies with ProfitBricks IaaS
Cloud computing case studies with ProfitBricks IaaS
ProfitBricks
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程
ITband
 
Enterprise Cloud Transformation
Enterprise Cloud TransformationEnterprise Cloud Transformation
Enterprise Cloud Transformation
Cloud Best Practices Network
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Citrix
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
GrigoryShkolnik1
 
cloud computng
cloud computng cloud computng
cloud computng
Krishna Gali
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)
Mike Trawick
 
Transform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOpsTransform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOps
Amazon Web Services
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
Cisco Canada
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
NETSCOUT
 
Azure Overview Csco
Azure Overview CscoAzure Overview Csco
Azure Overview Csco
rajramab
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Srinivasa Rao
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
AFCEA International
 

Similar to Brocade Software Networking Presentation at Interface 2016 (20)

ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11New Delhi Cloud Summit 05 26-11
New Delhi Cloud Summit 05 26-11
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
 
Cloud computing case studies with ProfitBricks IaaS
Cloud computing case studies with ProfitBricks IaaSCloud computing case studies with ProfitBricks IaaS
Cloud computing case studies with ProfitBricks IaaS
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程
 
Enterprise Cloud Transformation
Enterprise Cloud TransformationEnterprise Cloud Transformation
Enterprise Cloud Transformation
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
cloud computng
cloud computng cloud computng
cloud computng
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)
 
Transform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOpsTransform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOps
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
Azure Overview Csco
Azure Overview CscoAzure Overview Csco
Azure Overview Csco
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 

Recently uploaded

Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...
Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...
Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...
Asher Sterkin
 
Intro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AIIntro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AI
Ortus Solutions, Corp
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
DNUG e.V.
 
Cultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational TransformationCultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational Transformation
Mindfire Solution
 
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
ThousandEyes
 
MVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptxMVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptx
Mitchell Marsh
 
NYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdfNYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdf
AUGNYC
 
ANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdfANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdf
sachin chaurasia
 
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
Semiosis Software Private Limited
 
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial CompanyNBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Softwares
 
A Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdfA Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdf
kalichargn70th171
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
DNUG e.V.
 
ENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentationENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentation
sofiafernandezon
 
Development of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML TechnologiesDevelopment of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML Technologies
MaisnamLuwangPibarel
 
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdfWhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
onemonitarsoftware
 
Break data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud ConnectorsBreak data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud Connectors
confluent
 
Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)
miso_uam
 
Migrate your Infrastructure to the AWS Cloud
Migrate your Infrastructure to the AWS CloudMigrate your Infrastructure to the AWS Cloud
Migrate your Infrastructure to the AWS Cloud
Ortus Solutions, Corp
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
karim wahed
 
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTIONBITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
ssuser2b426d1
 

Recently uploaded (20)

Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...
Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...
Ported to Cloud with Wing_ Blue ZnZone app from _Hexagonal Architecture Expla...
 
Intro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AIIntro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AI
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
 
Cultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational TransformationCultural Shifts: Embracing DevOps for Organizational Transformation
Cultural Shifts: Embracing DevOps for Organizational Transformation
 
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
 
MVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptxMVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptx
 
NYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdfNYC 26-Jun-2024 Combined Presentations.pdf
NYC 26-Jun-2024 Combined Presentations.pdf
 
ANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdfANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdf
 
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
React vs Next js: Which is Better for Web Development? - Semiosis Software Pr...
 
NBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial CompanyNBFC Software: Optimize Your Non-Banking Financial Company
NBFC Software: Optimize Your Non-Banking Financial Company
 
A Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdfA Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdf
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
 
ENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentationENISA Threat Landscape 2023 documentation
ENISA Threat Landscape 2023 documentation
 
Development of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML TechnologiesDevelopment of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML Technologies
 
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdfWhatsApp Tracker -  Tracking WhatsApp to Boost Online Safety.pdf
WhatsApp Tracker - Tracking WhatsApp to Boost Online Safety.pdf
 
Break data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud ConnectorsBreak data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud Connectors
 
Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)
 
Migrate your Infrastructure to the AWS Cloud
Migrate your Infrastructure to the AWS CloudMigrate your Infrastructure to the AWS Cloud
Migrate your Infrastructure to the AWS Cloud
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
 
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTIONBITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
 

Brocade Software Networking Presentation at Interface 2016

  • 1. Brocade Software Networking © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Scott Sims ssims@brocade.com
  • 2. Data Center Journey over the Past Decade! 2 Consolidation Virtualization Convergence Cloud New IP Business Dynamics Act as a Catalyst for Network Change 2000 2010 20142007 Data Center in a Rack Today
  • 3. New IP—Transformation of the Network Enabling a new way of doing business 3 Technology Excellence Open with a purpose Innovation centric, software enabled Ecosystem driven Your own pace, your own way Business Excellence Unleash the Power of Network Today, to Be Future Ready BUSINESS IT
  • 5. Software Defined Networking (SDN) A Programmable Network—Design, Build, Manage 5 Data Plane Control Plane Basic Network Services: Topology Mgr, Switch Mgr, Host Tracker, Stats Mgr Advantages • Logically centralized view of the overall network • Improved interoperability and manageability • Enable users to develop and deploy unique capabilities for their network needs REST APIs Network protocols like OpenFlow Applications and Orchestration Frameworks
  • 6. Network Functions Virtualization (NFV) 6 Hardware Software Router VPN Firewall Advantages • Virtualize the network devices to create multiple virtual functions for various network appliances • Enable service innovations and meet service SLAs • Reduce CAPEX/OPEX
  • 7. Introduction to Brocade Software Networking Solutions
  • 8. Brocade SDN Controller Leading open source SDN Controller—Part of open, modular portfolio 8 Designed for an open, multivendor world • Each layer can be selected independently • No platform or northbound dependencies Simple on-ramp to SDN • Low-risk investment protection • Smooth installation and maintenance Collaborative innovation • Joint and custom app development • Bridge to OpenDaylight community Rapid Service Delivery Brocade SDN Controller is an open-source SDN Controller built directly from OpenDaylight.
  • 9. Brocade vRouter Increase networking agility and connectivity with improved ROI 9 100M+ Production Hours Proven High Density with Breakthrough Performance Brocade vRouter is the first virtual router capable of providing advanced networking and security in software with scale, reliability, and performance. High ROI and efficiency • Proven high VNF density of vRouters in single server • Low CPU consumption provides headroom for other VNFs Delivers breakthrough performance • 80Gbps line rate on single vRouter • Advanced enhancements with Intel DPDK High versatility • Single product, multiple functions for Cloud & SP • Cloud network segmentation, Secure gateway services and Workload and Subscriber firewall
  • 10. Brocade Virtual Application Delivery Controller (vADC) Fast, secure, available applications 10 Flexible Licensing for Enterprise Capacity Management Brocade Virtual Application Delivery Controller (vADC) solutions help ensure predictable high- performance for applications whenever and wherever they are deployed. Purpose-built for the Cloud • Deploy in any Hybrid Cloud architectures • On-demand application delivery—ADCaaS • Established CSP partnerships—Azure, AWS, Rackspace, Joyent, etc. Process automation • Easy, consistent deployment of Service templates (LBaaS) and service isolation with centralized mgmt. • Usage visibility—metering and billing capabilities for chargeback • Integration with key orchestration tools—OpenStack, VMware NSX and Brocade SDN Controller Hyperscale and Performance on Demand • Highest Layer 7 throughput for software (50GB/node) • Unique web application security solution
  • 11. The Brocade vADC Family A Comprehensive Approach To Application Delivery 11 • Load Balancer / Traffic Manager / ADC • Provides reliability, availability, offload, security, scripting, and more • Traffic Script • Web Application Firewall • Defends your web applications against Layer-7 attacks • Elastic and adaptive services director • Automates licensing, & metering of ADC services • Disruptive licensing model Services Director VirtualTraffic Manager VirtualWeb Application Firewall Web Acceleration • Web acceleration • Image and content compression and caching
  • 12. Brocade Services Director • Enterprise capacity management • Unique Capacity Pooling Provides Unmatched Flexibility and Scalability 12
  • 13. Making Capacity and Resource Mgmt Easy  Unique usage-based licensing model  Dynamic resource and capacity allocation for changing workload  Drill down to usage reports and export billing data for chargeback Resource and Services View Capacity Allocation View Services, Catalogue, Diagnostic, Active, and Systems View
  • 14. Brocade Virtual Traffic Manager • High Performing L7 Based Load Balancing • Automated/orchestrated ADCaaS solution 14 In the Beginning: Direct Client/Server You Need Scale and Availability Huge increase in users Apps are always up and running … … … ADC Per App Architecture
  • 15. Unmatched Ability to Cluster 15 Improved performance and reliability Even better performance and reliability BROCADE’S ABILITY TO CLUSTER.
  • 17. TCP IP Business Logic HTTP Web App Firewall Business Logic HTTP TCP IP Network Firewall Business Logic HTTP TCP IP Reverse Proxy Traditional network firewalls: • Operate at TCP/IP level • Opening/closing ports Reverse proxies, next-gen firewall and DPI • Allows / blocks users and applications, traffic patterns • Limited view of business logic • Fails PCI DSS requirement Web application firewalls look beyond TCP/IP into application-level security: • Business logic inspection • HTTP content • Dual-mode “Detect & Protect” security Network firewalling has become commodity, the trend has been to move to application layer attacks Source: 10.1.1.42:3231 Destination: 192.168.1.12:80 Sequence Number: 32234 POST /Account/Profile Host: www.onlinebank.com Cookie: Sessionid = 172347 Action=transfer_mon ey&from_account=1 3654&to_account=3 2165&amount=1000 USD Brocade Web Application Firewall
  • 18. • A scalable, application-aware Layer 7 security solution • Offers highest protection and performance in web and cloud application security • Allows customers to mitigate web application security threats in a scalable manner • Distributed WAF 18 Web Applications Hacker User vWAF Brocade Web Application Firewall
  • 20. 20 Web applications present unique challenges… A 1-second delay in page load time 7% loss in conversions 11% fewer page views 16% decrease in customer satisfactionIf your site earns $200,000 per day, you could lose up to $5M in annual sales Source: Aberdeen group
  • 21. Automate Web Performance best Practices Dynamic Layout Compress • JavaScript & Stylesheet shrinking • Image resampling • Metadata removal • Dynamic Gzip/deflate compression • JavaScript/Stylesheet re-ordering • Removal of missing and duplicate content • Browser aware optimizations (Desktop, Mobile and legacy browsers ) Cache • On-Proxy resource caching • Dynamic page caching • Aggressive Browser caching • Auto URL versioning Combine • Merge Stylesheets • Image Spriting • Background image inlining Automates web performance best practices, so you can focus on strategic development & content
  • 22. Examples of where to leverage vADCaaS 22 Enterprise Apps “It handles all our traffic with no problem, and the fact that I don’t have to do much with it is very very important. With all the other stuff on my plate, not having to constantly watch over the load load balancer is huge.” — Chris Loughlin, Citrix Certified Administrator and Epic Client Systems Manager Virtual Datacenter “With Brocade vTM now in place, everything is virtual. We just click a button and it happens in a very predictable and easily configurable manner. - Yoni Kirsh, managing director of Fastrack Technology E-Retail “With a faster website, the number of page views increased, which naturally led to higher conversion rates and an increase in orders.” — Lionel Touati, online sales technical director at Maisons du Monde Online Media & Games “The Brocade Virtual Traffic Manager does exactly what it’s supposed to do, and everything that we need it to do.” — Greg Birdwell, infrastructure architect at BARBRI Developer Teams “We never know what a customer may want to implement next, but we know with TrafficScript we are ready for any future implementation.” — Josh Allen, Web Operations Infrastructure Engineer at CoSentry
  • 23. What You Can Achieve with Brocade vADC 23 Capacity Planning 10x Faster Provisioning Up to 90% Greater ROI Automated Service Management Enterprise Licensing
  • 24. Call to Action…Take the First Step Today Brocade.com Product Pages – Brocade Virtual Application Delivery Controller (vADC) – Brocade vRouter – Brocade SDN Controller FREE Trial Software Downloads – Brocade vADC – Brocade vRouter – Brocade SDN Controller Book Demo or POC – Contact Scott Sims: ssims@brocade.com / 972-567-4756 24

Editor's Notes

  1. Today I’ll talk about the Brocade Software Networking Solutions that leverage SDN and NFV technologies. These technologies from Brocade deliver an Open and an Agile solution architecture that further improves economics.
  2. In 2000 we started with consolation server farms Later virtualization was introduced to bring efficientices with the hardware and physical space Convergence with intergrated systems and improved deployment times Then Cloud as a service to help control operation and hardware costs and improve agility What is the new IP?
  3. Brocade New IP focuses on transforming the network to precisely achieve the flexibility and agility that is needed to meet the SLAs. The 4 key tenets of New IP are to deliver innovative technologies that are Open, .Software-based, Ecosystem driven but at the same time enabling the customers to adapt to these new transformative innovations at their own pace. This enables a new way of doing business ie. now it is the business that drives IT and not the IT limitations chaining the business growth. So thereby Unleash the Power of Network Today, in order to be Future Ready!
  4. Let’s talk about SDN and NFV at a very high level. Many of you may already know about it.
  5. So what is SDN – Software Defined Network? SDN is a programmable network that enables the customer to design, build and manage their own network. It decouples the Data Plane from the Control Plane on a physical network device. The advantages of doing so are: Logically centralized view of the overall network Improved interoperability and manageability Enable users to develop and deploy unique capabilities for their network needs
  6. What is NFV – Network Functions Virtualization? In order to make the network more flexible and agile, one of the best software technologies is NFV. It essentially virtualizes the hardware network devices like router, ADC, firewall, VPN. The advantages of this are: Virtualize the network devices to create multiple virtual functions for various network appliances ie. Layer 3 to Layer 7 Enable service innovations and meet service SLAs Reduce CAPEX/OPEX
  7. Brocade SDN Controller is a leading open source solution based on OpenDaylight. We are a commercial version of the opendaylight sdn controller. We bring our experience and support to help customers embrace SDN and limit any switch costs. It is a vendor-agnostic solution as it is- Designed for an open, multivendor world Each layer can be selected independently No platform or northbound dependencies Simple on-ramp to SDN Low-risk investment protection Smooth installation and maintenance Collaborative innovation Joint and custom app development Bridge to OpenDaylight community
  8. Brocade vRouter is the first virtual router that has the ability to provide advanced networking and security in software. It delivers the following benefits: High ROI and Efficiency Proven high VNF density of vRouters in single server Low CPU consumption provides headroom for other VNFs Delivers breakthrough performance 80Gbps line rate on single vRouter Advanced enhancements with Intel DPDK High Versatility Single product, multiple functions for Cloud and SP like router, VPN, Firewall Cloud network segmentation, Secure gateway services and Workload and Subscriber firewall Brocade vRouter has more than 100M+ production hours deployed at customer sites.
  9. Brocade Virtual Application Delivery Controller (vADC) solutions help ensure predictable high-performance for applications whenever and wherever they are deployed. Purpose-built for the Cloud Deploy in any Hybrid Cloud architectures On-demand application delivery - ADCaaS Established CSP partnerships – Azure, AWS, Rackspace, Joyent etc Intel DPDK – Explain the benefits Process automation Easy, consistent deployment of Service templates (LBaaS) and service isolation with centralized management Usage visibility – metering and billing capabilities for chargeback Integration with key orchestration tools – OpenStack, VMware NSX and Brocade SDN Controller Hyperscale and Performance on Demand Highest Layer 7 throughput for software (50GB/node) Unique web application security solution
  10. There are four parts to the vADC story, which together provide a comprehensive on-demand solution, and build up to the concept we call “Application Delivery as a Service” or “ADC-as-a-Service” First, the core ADC platform is known as Brocade Traffic Manager: this provides core Layer 4 to 7 services, including load balancing, caching and SSL offload, and a powerful scripting tool, called TrafficScript. And we will see in a moment, Traffic Manager also acts as the platform on which we build higher-level services for security and content optimization. Second, Brocade Web Application Firewall is a Layer-7 web application firewall, which is designed to protect applications from external application-level attacks. While a network firewall ensures that only certain types of traffic are permitted or denied, a web application firewall works with the business logic to decide whether to allow the request to be processed, checking for targeted attacks such as SQL Injection and Cross-Site scripting, and preventing data leakage. Third, to accerate your web application convent we have the Web Accelerator which compress and caches web app content to improve bandwidth used, load times, lowers requests, best CDN Enterprise services on load times and number of requests Finally, Brocade Services Controller gives a framework to manage on-demand provisioning, by automating the deployment, licensing and metering of ADC services across a virtual or cloud framework. When linked to a service orchestration framework, we call this ability to create and manage on-demand application delivery services “ADC-as-a-Service” and it transforms the way ADC services are consumed by enterprises and service providers to a much more fluid capacity-based model.
  11. See Slide 27 for detailed explanation to help you talk through this slide with a customer. Financial and time benefits of going with us In traditional models each ADC has specific capacity allocated to it that cannot be shared with other ADCs With Brocade customers purchase capacity to fill their ‘bucket’, that capacity can then be distributed and redistributed between ADCs as needed in unlimited numbers.
  12. Whether for services providers or enterprises, we provide a complete set of tools to manage the inventory of ADC instances, so you know how resource pools are being used, and to plan ahead for how to re-allocate resources between different applications and groups. Usage reports can be created for business units and individual clients, making it easy to implement charge-back and billing for cost allocation across the business.
  13. Each app has its own vTM = address scale and availability – need to make sure it looks virtual – animation There are FOUR parts to the vADC story, which together provide a comprehensive on-demand solution, and build up to the concept we call “Application Delivery as a Service” or “ADC-as-a-Service” First, the core ADC platform is known as Brocade Traffic Manager: this provides core Layer 4 to 7 services, including load balancing, caching and SSL offload, and a powerful scripting tool, called TrafficScript. And we will see in a moment, Traffic Manager also acts as the platform on which we build higher-level services for security and content optimization. Second, Brocade Web Accelerator provides automatic HTML optimization, to reduce page load times. Traffic Manager includes a number of powerful tools to accelerate applications and services, but Web Accelerator gives an extra boost for some types of applications. Third, Brocade Web Application Firewall is a Layer-7 web application firewall, which is designed to protect applications from external application-level attacks. While a network firewall ensures that only certain types of traffic are permitted or denied, a web application firewall works with the business logic to decide whether to allow the request to be processed, checking for targeted attacks such as SQL Injection and Cross-Site scripting, and preventing data leakage. Finally, Brocade Services Controller gives a framework to manage on-demand provisioning, by automating the deployment, licensing and metering of ADC services across a virtual or cloud framework. When linked to a service orchestration framework, we call this ability to create and manage on-demand application delivery services “ADC-as-a-Service” and it transforms the way ADC services are consumed by enterprises and service providers to a much more fluid capacity-based model.
  14. A Web Application Firewall is a security add on module to the Traffic manager, which focuses on fixing the vulnerabilities found in Web Applications. It is designed to secure known and unknown vulnerabilities and block attacks by implementing a rich set of security features.
  15. The Web Application Firewall can meet the most demanding application-level security requirements, helping compliance with regulations such as PCI DSS and HIPAA. Lets take a look at our layers of security and understand that there is no one stop shop solution for total IT security *Click* Traditional firewalls focus on and network-level security, I ensuring that only the right kind of traffic and destinations are permitted access to the application. A "regular" firewall typically looks at layers 3 and 4 of the OSI model. For instance, to allow TCP port 80, allow UDP port 53 from only specific IP addresses, or deny TCP port 25. *Click* Next, the more sophisticated next-generation firewalls look at patterns in traffic and may be able to identify users and application signatures in the traffic – but they still do not meet the requirements of PCI DSS, which requires full content inspection and parameter validation. Reverse proxies, IDSs and IPSs: Link packets into streams Limited view of business logic Fail PCI DSS requirement Next Gen Firewalls: • Designed to be a primary firewall, identifying and controlling applications users and content traversing the network. • App-ID: Identifies and controls more than 900 applications of all types, irrespective of port, protocol, SSL encryption or evasive tactic. • User-ID: Leverages user data in Active Directory (as opposed to IP addresses) for policy creation, logging and reporting. • Content-ID: Blocks a wide range of malware, controls web activity and detects data patterns (SSN, CC#) traversing the network. *Click* Lastly, Web Application Firewall looks above these levels, and works closely with the application itself, WAFs exists because organizations have lots of custom written (web) applications, that won't be included in the "well known applications and protocols” protected by Next Gen Firewalls. A WAF and can provide proactive security tools such as form virtualisation, cookie and URL encryption, and complete control over parameter validation to detect SQL injection, cross-site scripting attacks directory traversal, or brute-force authentication attempts. . WAF is designed to compensate for insecure coding and “virtually patch” vulnerabilities • Business logic inspection • Proactive application security (log/alert suspicious requests and suggest protection measures) • Looks specifically for flaws in the application itself • Highly customized for each security environment – looking at how the web application is supposed to act and acting on any odd behavior. • Does not address the performance requirements of a primary firewall. While these different security device may have slight functional overlaps, none can claim to be a complete security solution for any enterprise. The Web Application Firewall focuses on Application security and defends in conjunction of other complementing security solutions in the layered security model Attacks can be carried out against any of these layers. As network firewalling has become commodity, the trend has been to move to application layer attacks. Example attacks: IP layer: ping of death (DoS) TCP layer: SYN flood (dDoS) HTTP layer: forceful browsing (accessing hidden but unprotected assets) Business Logic layer: logic flaws (e.g. logging in as one user, but then doing some action in the name of another)
  16. A scalable, application-aware Layer 7 security solution Offers highest protection and performance in web and cloud application security. The vWAF identifies and stops attacks that would typically be missed by a network firewall protecting valuable data. Web Application Firewalls allow customers to mitigate web application security threats in a scalable manner.
  17. Shown here is a list of optimizations dynamically applied by the Web Accelerator. Most of these optimizations are well documented and most web applications developers are aware of them and their benefit In fact, Google PageSpeed and Yahoo ySlow are two well known grading tools that score your web performance based on how many optimizations best practices are applied your webpages. Having a high score in any of these benchmarks will not only ensure you have a light and fast loading webpage but also a highly SEO score as all the main search engines (Google, yahoo, Bing, etc.) all take into account the speed of your website in consideration when returning search engine results Although well documented, applying these best practices in a consistent manner is a different story. As you can imagine every time you push out new iterations of web designs and code you need to ensure all these best practices are followed, this takes time to test and implement, often taking time out of development to dedicate time to fix and optimize design and code and not all organizations have resources to do so. Think of Web Accelerator as a tool for your development team not a replacement – Web Accelerator automates these best practices at runtime and each time new content is pushed A website’s Google PageSpeed and Yahoo ySlow score instantly is improved Google PageSpeed: https://developers.google.com/speed/docs/insights/about YSlow: http://yslow.org/faq/