Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.

Similar presentations


Presentation on theme: "© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential."— Presentation transcript:

1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.

2 Cisco Confidential 2 Provide a Product that Requires NO programming to Utilize Focus on Real World Day0/1 Applications QOS, ACL, ZTD management. Basic visualization, interrogation, and decision making services that balances operations management simplicity gains with low risk adoption Ensure Product can Scale Out for large scale production network use Start with Brownfield Greenfield requires image updates that will complicate and delay evaluation start times and length.

3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Data CenterEnterpriseChanges from XNC Early Adoption Apps FocusDay 2Day 0/1Day 0/1 requires new services Programming TolerationModerateLowRequires Advanced GUI Network Device ManagementGreenfieldBrownfieldRequires CLI Southbound Interface ScalingUpOutRequires Elastic Infrastructure Northbound InterfacesJAVA/RES T RESTREST is common NBI architecture Multiprotocol SupportSAL SAL is common SBI architecture

4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Enterprise Applications Enterprise Applications SAL REST APIs Enterprise Services Enterprise Services Inventory and State Inventory and State Identity and Location Identity and Location Application Awareness Application Awareness Policy Management Policy Management QoS Reserved ZTD ACL Elastic Infrastructure CLI Openflow Advanced Topology Management ENG Controller Services for Day0/1 Applications Day0/1 Applications Addresses Low Programming Tolerance Addresses Brownfield Support Addresses Scale Out Requirements

5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Simplicity: Advanced Visualization Eliminates Network Admin SDN Programming Skills Gap UX toolkit allows network topologies to be viewed graphically Java/HTML enables network management using object oriented interfaces Programmability: Automated Policy Management Reduces Application Complexities Abstracting process management into controller ensures consistent behavior across applications Accelerates application development by reducing development load (content management only) Production Capable: Elastic Services Infrastructure Ensures Scaling as Adoption Grows Allows controller to service a wide array of applications and network sizes Ensures all production network requirements are met (H/A….) Justifiable Investments: Real World Applications Focus QOS, ACL, ZTD management are applications with identifiable metrics (OPEX savings, ROI) Provides low risk opportunity to adopt SDN

6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Validate basic key controller services Validate basic application features (focus on visualization and interrogation) Determine use case-solutions next step requirements Learn about customer care-abouts for Deployment, Operational adoption etc. Serverx86 vCPU4 or Higher RAM16 or Higher OSLinux JavaVer(1.7) BrowserChrome (28.0 or later) HypervisorvSphere 5.x RoutersISR(1900, 2900, 3900), ASR1K Switches3850, 3850x, 2960s, 3560x, 3650 IOS/IOS-XELatest EFT -1 customers targeted: No of test bed devices supported: ~15

7 Thank you.

8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. ENG Controller Features

9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 3D View Multiple Views with Zoom, Roping and other Web Application–Like Controls Network A Network B 2D View 3D View Constellation View CONFIDENTIAL HTML 5 Based Visualizer that Utilizes REST APIs User Defined Classifications with Group Tagging

10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Inventory and State Network information base (NIB) that provides services and applications with a single source of truth for scanned network devices and their operational states Identity and Location Radius proxy for collecting user id and location (stored in NIB) Application Awareness Provides applications statistics by link Policy Management Provides consistent methodology across applications for analytics gathering, situation analysis, and policy decision making which can be enforced manually or programmatically

11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Quick, easy and efficient discovery of network elements, key enabler for end to end network visualization Common distributed database(NIB) with detailed device level Inventory information for easier consumption by services and applications Single source of truth and information for all device related information obviates the need to go to network every time, saving time and resources Complete awareness and visibility of the overall operational health of the physical network, creating a single pain of glass view Enables real time network inventory and asset service management

12 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Important components in building secure network access service across wired, wireless and VPN networks Allows end point visibility with ability to track user Identity, location, in use devices and device health status from a single pane of glass Key enabler for building highly sophisticated policies Enables policy enforcement on a per user, per device and per location basis, allowing granular control of the network Identity information gathered from ISE and AAA server using pxGrid and Radius proxy functions respectively

13 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Fully automated enterprise application discovery, allows enterprises to have complete information about in use applications without costly resources Key enabler for creating fine grained access policies, required for controlling access at an atomic level i.e on a per user per application basis Creates lot of compelling business use cases such as per user application traffic tapping, DDoS traffic mirroring and priority markings etc. Important ingredient for building application level views of the network, creating number of useful applications such as network resource planning, SLA monitoring, compliance, troubleshooting etc

14 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Policy Manager Policy Manager QoS Manager QoS Manager ACL Manager ACL Manager ZTD Manage r ZTD Manage r Common Application-Interaction Constructs SAL Network Users Policy Actions Action Properties Content Management Process Management Application Development Scope Abstracting Process Management Enables Consistent Controller Behavior Across Applications and Lightens Application Development Load

15 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 QoS Manager Utilizes QoS policy templates as inputs to provide network view for interrogation, analysis, compliance, and policy change management ACL Manager Enables inspection, interrogation and analysis, and ACL change management including identification of conflicts and shadow ACLs. ZTD Enables any network device located anywhere in the network that with a recognizable IP address to be configured remotely


Download ppt "© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential."

Similar presentations


Ads by Google