A10 Thunder ADC delivers critical services in the most efficient hardware- and software-based form factors. Thunder ADC product line maximizes rack space and reduces power consumption (via optimal ADC CPU and memory optimization, infrastructure optimization and overall data center cooling).
The product line is built upon A10's Advanced Core Operating System (ACOS®) platform, with our Symmetric Scalable Multi-Core Processing (SSMP) software architecture that delivers high performance and a range of deployment options for dedicated, hosted or cloud data centers.
Dynamic L4-7 Services for OpenStack Cloud Data CentersA10 Networks
This document summarizes A10 Networks' dynamic L4-7 application networking solutions for OpenStack cloud data centers. It introduces A10's portfolio including application delivery controllers, carrier-grade NAT, and network perimeter security. It describes challenges with legacy static L4-L7 services and how A10's dynamic service chaining addresses demands for agility, scale, and reduced total cost of ownership. Key aspects of A10's cloud services architecture are discussed, including high performance appliances, virtual appliances, pay-as-you-go licensing, OpenStack integration using an LBaaS driver, and how this approach provides scale, reduced TCO, and agility for cloud providers and their tenants.
Session: The Data Center Network Evolution: Journey to the Programmable Fabric
Presenter: Robert Zalobinski, Technical Solutions Architect
Date: October 6, 2015
This document discusses cloud infrastructure and how it is built. It begins by outlining the structure of cloud computing, comparing cloud to traditional hosting architectures. It then describes the different layers of cloud, including storage, servers, networking, operating systems, and more. It discusses how cloud provides scalability through its design with no single point of failure. The document also looks at the future of cloud, such as using ARM/ATOM processors and the rise of containers. In general, it provides an overview of cloud infrastructure and architectures.
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930A10 Networks
1. A10 Networks introduced its new Thunder Series Unified Application Service Gateway (UASG) appliances, including the 3030S, 1030S, and 930 models.
2. The Thunder UASG aims to simplify operations and reduce costs by converging application delivery, security, and other networking functions into a single platform. It claims to increase availability, scalability, and security while extending the lifetime of existing equipment.
3. The new Thunder appliances include the 3030S for large enterprises, the 1030S for small-to-mid sized enterprises, and the lower-cost 930 for small business and branch offices. They provide load balancing, web application firewall, DDoS protection, and other
Dynamic L4-7 Services for Cloud Data CentersA10 Networks
A10 Networks introduces its aCloud service architecture for provisioning Layer 4-7 application networking services in cloud data centers on-demand. The architecture leverages A10's Thunder series of physical and virtual appliances along with aCloud's pay-as-you-go licensing model. It integrates with OpenStack to dynamically provision services like load balancing, DDoS protection, and SSL offloading when deploying new workloads. This provides automation, operational agility, flexible form factors, and reduced costs compared to legacy static data center designs.
The document provides an overview of the Arista Cognitive Campus CCS-720 series switches. The CCS-720 series offers a variety of switch models with different port configurations and speeds ranging from 10Mbps to 100Gbps. The switches run the Arista EOS operating system and support features like PoE, segmentation, overlay networking, traffic monitoring and resilience capabilities. The switches are targeted towards campus network deployments to provide connectivity, power, management and monitoring for user workloads.
Faced with the dual threats of rising operating costs and declining revenues, network service providers are increasingly turning to network functions virtualization (NFV) to help them keep up with constantly changing market conditions.
In a virtualized Telco environment, service providers can deploy and deliver new network functions, services and capacity on demand—reducing normal rollout time from months and weeks to just hours.
Leveraging the principles of cloud computing, network service providers can deliver a level of responsiveness never before available, easily scaling capacity up or down to meet the evolving needs of their subscribers.
The result is a highly agile system that allows new revenue-generating services to be quickly developed, exhaustively tested and selectively rolled out to targeted groups in a fraction of the time and at a much lower cost than previously thought possible.
In this session, the speaker will present how the solution from Juniper networks look like and how it can be deployed by service provider to improve their agility in delivering services to their customers.
OpenContrail Silicon Valley Meetup Aug 25 2015Scott Sneddon
The document discusses SDN market trends based on an SDxCentral report. It summarizes that the SDN, NFV, and network virtualization market is expected to exceed $105 billion by 2020 according to the report. It also provides details on SDN controllers, including major open source and commercial controllers. The rest of the document discusses use cases, selection criteria for controllers, and SDN adoption trends seen by the speaker.
Dynamic L4-7 Services for OpenStack Cloud Data CentersA10 Networks
This document summarizes A10 Networks' dynamic L4-7 application networking solutions for OpenStack cloud data centers. It introduces A10's portfolio including application delivery controllers, carrier-grade NAT, and network perimeter security. It describes challenges with legacy static L4-L7 services and how A10's dynamic service chaining addresses demands for agility, scale, and reduced total cost of ownership. Key aspects of A10's cloud services architecture are discussed, including high performance appliances, virtual appliances, pay-as-you-go licensing, OpenStack integration using an LBaaS driver, and how this approach provides scale, reduced TCO, and agility for cloud providers and their tenants.
Session: The Data Center Network Evolution: Journey to the Programmable Fabric
Presenter: Robert Zalobinski, Technical Solutions Architect
Date: October 6, 2015
This document discusses cloud infrastructure and how it is built. It begins by outlining the structure of cloud computing, comparing cloud to traditional hosting architectures. It then describes the different layers of cloud, including storage, servers, networking, operating systems, and more. It discusses how cloud provides scalability through its design with no single point of failure. The document also looks at the future of cloud, such as using ARM/ATOM processors and the rise of containers. In general, it provides an overview of cloud infrastructure and architectures.
Thunder Series Unified Application Service Gateway (UASG): 3030S, 1030S and 930A10 Networks
1. A10 Networks introduced its new Thunder Series Unified Application Service Gateway (UASG) appliances, including the 3030S, 1030S, and 930 models.
2. The Thunder UASG aims to simplify operations and reduce costs by converging application delivery, security, and other networking functions into a single platform. It claims to increase availability, scalability, and security while extending the lifetime of existing equipment.
3. The new Thunder appliances include the 3030S for large enterprises, the 1030S for small-to-mid sized enterprises, and the lower-cost 930 for small business and branch offices. They provide load balancing, web application firewall, DDoS protection, and other
Dynamic L4-7 Services for Cloud Data CentersA10 Networks
A10 Networks introduces its aCloud service architecture for provisioning Layer 4-7 application networking services in cloud data centers on-demand. The architecture leverages A10's Thunder series of physical and virtual appliances along with aCloud's pay-as-you-go licensing model. It integrates with OpenStack to dynamically provision services like load balancing, DDoS protection, and SSL offloading when deploying new workloads. This provides automation, operational agility, flexible form factors, and reduced costs compared to legacy static data center designs.
The document provides an overview of the Arista Cognitive Campus CCS-720 series switches. The CCS-720 series offers a variety of switch models with different port configurations and speeds ranging from 10Mbps to 100Gbps. The switches run the Arista EOS operating system and support features like PoE, segmentation, overlay networking, traffic monitoring and resilience capabilities. The switches are targeted towards campus network deployments to provide connectivity, power, management and monitoring for user workloads.
Faced with the dual threats of rising operating costs and declining revenues, network service providers are increasingly turning to network functions virtualization (NFV) to help them keep up with constantly changing market conditions.
In a virtualized Telco environment, service providers can deploy and deliver new network functions, services and capacity on demand—reducing normal rollout time from months and weeks to just hours.
Leveraging the principles of cloud computing, network service providers can deliver a level of responsiveness never before available, easily scaling capacity up or down to meet the evolving needs of their subscribers.
The result is a highly agile system that allows new revenue-generating services to be quickly developed, exhaustively tested and selectively rolled out to targeted groups in a fraction of the time and at a much lower cost than previously thought possible.
In this session, the speaker will present how the solution from Juniper networks look like and how it can be deployed by service provider to improve their agility in delivering services to their customers.
OpenContrail Silicon Valley Meetup Aug 25 2015Scott Sneddon
The document discusses SDN market trends based on an SDxCentral report. It summarizes that the SDN, NFV, and network virtualization market is expected to exceed $105 billion by 2020 according to the report. It also provides details on SDN controllers, including major open source and commercial controllers. The rest of the document discusses use cases, selection criteria for controllers, and SDN adoption trends seen by the speaker.
Case Study: Anuta NCX empowers Telstra Cloud Gateway to deliver Global Interc...Kiran Sirupa
Telstra has pioneered Cloud Data Center
Interconnect (CDCI) technology to offer a one-stop-shop infrastructure as a service by connecting
multiple clouds to suit different customer requirements: vCloud Air for “Virtualized Environments, IBM
Soft Layer for “Bare Metal” applications such as legacy applications as well as Amazon AWS and
Microsoft Azure public cloud.
The document summarizes new hardware platforms from A10 Networks called the Thunder 5430S, 6430, and 6430S. These platforms provide high performance and scalability for large-scale virtualization and consolidation of up to 1024 tenants on a single device. They also enable on-demand premium cloud services and eliminate point solutions. The Thunder 6430S can deliver 150 Gbps of throughput in a 1 RU form factor and the Thunder 5430S provides 77 Gbps in a compact and efficient 1 RU design. Both platforms utilize FPGA and ASIC technology along with Intel Xeon CPUs to deliver maximum performance, security, and uptime.
This presentation examines cloud bursting with A10 Lightning ADS. With cloud bursting in A10 Lightning ADS, you can leverage AWS to dynamically add capacity in the cloud for applications deployed in the data center.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
A10 Networks (NYSE: ATEN), a leader in application networking and security, today expanded the Thunder TPS (Threat Protection System) family of high-performance solutions – to now include the industry’s biggest gun in the rapidly escalating war against DDoS attacks. Rounding out the product line are entry-level virtual and hardware appliance form factors, all with easy integration into existing networks, including open source systems, for faster deployment, plus the option to scale in cloud environments.
This document discusses Citrix's unification of its product portfolio and transition to new names. Key changes include Citrix ADC transitioning from NetScaler ADC, Citrix SD-WAN transitioning from NetScaler SD-WAN, and Citrix Gateway transitioning from NetScaler Unified Gateway and NetScaler Access Gateway among others. The goal is to create awareness and understanding of the portfolio changes to gain adoption of the new solutions while preserving equity in the old names as long as necessary.
ACOS 2.7.1 Release with Integrated WAF, AAM and DDoS ModulesA10 Networks
This document introduces new security modules in A10 Networks' ACOS 2.7.1 release, including an integrated web application firewall (WAF), application access management (AAM), and enhanced distributed denial of service (DDoS) protection. The WAF protects web applications from code vulnerabilities, the AAM provides centralized authentication, and the DDoS protection mitigates network and application attacks. These modules leverage ACOS's intelligent software platform and provide security services without additional licensing on A10 Thunder and AX Series models. The release also features usability enhancements, 165+ new features, and flexible deployment options.
View On-Demand :
http://ecast.opensystemsmedia.com/340
As distributed system scale up, so does their integration time and cost. This integration challenge is particularly acute for real-time and intelligent systems: increased connectivity cannot come at the expense of performance, reliability or resource consumption.
Adopting an inherently scalable architecture is the secret to agilely and affordably building systems that encompass ever more applications, nodes and real-time data. This webinar will review how you can apply proven integration techniques—such as loose coupling and service orientation—to demanding real-time systems. Unlike approaches designed for conventional business applications, the architecture we'll introduce is appropriate for systems that span embedded, high performance and IT applications.
This webinar targets software architects, chief engineers and development leads in all industries that design real-time and intelligent systems. This includes defense, industrial, transportation, medical and aerospace applications.
Better integration is increasingly the key to competitive advantage. It provides end-users with higher situational awareness, responsiveness and resource utilization. Don't let your architecture hold you back.
This document discusses cloud data center network architectures and how to scale them using Arista switches. It describes the limitations of legacy data center designs and introduces the cloud networking model. The cloud networking model with Arista switches provides benefits like lower latency, no oversubscription between racks, and the ability to scale to hundreds of racks. The document then discusses how to scale the network using layer 2, layer 3, and VXLAN designs from thousands to over a million nodes. It provides examples of scaling the number of leaf and spine switches to achieve greater node counts in a non-blocking two-tier design.
Enabling SDN for Service Providers by Khay Kid ChowMyNOG
1. The document discusses how programmable networks and network functions virtualization (NFV) enable new use cases and business models for service providers by making networks software-defined and services elastic.
2. Key aspects covered include centralizing network control, virtualizing network functions, and using orchestration to dynamically provision and monitor virtualized services across compute and network infrastructure on demand.
3. The benefits highlighted are automating network operations, enabling new self-service capabilities, and decreasing time to revenue through agile service creation.
This document provides an introduction to OpenStack, including:
- OpenStack is an open-source software platform for building private and public clouds with components that provide compute, storage, and networking capabilities.
- The OpenStack architecture is modular with components that can be used individually or together, including compute, networking, block storage, image service, object storage, identity service, and dashboard.
- Challenges of deploying OpenStack include needing skills in Linux, cloud infrastructure, and OpenStack architecture, as well as getting operations and engineering teams familiarized with OpenStack.
Software Defined Networking - Huawei, June 2017Novosco
An overview of Huawei Cloud Campus Networks and Software Defined Networking. Presented at Novosco's Network and Infrastructure event, Dublin, June 2017.
The document discusses simplifying cloud adoption with Cisco technologies. It describes the challenges of a multi-cloud environment and the benefits of building a private cloud with Cisco solutions for automation, orchestration, and networking. It also addresses how to define application priorities and dependencies to determine the best placement in public, private or hybrid clouds.
This document discusses network virtualization and how it provides virtual-to-physical network abstraction. It describes using logical networks to automate network services provisioning, enable microsegmentation for security, and augment physical network appliances. The key goals of network virtualization are also to make the network simple, scalable, high-bandwidth, fault-tolerant, and quality-of-service providing.
Session delivered by Scalar on Network Functions Virtualization. NFV allows for:
Rapid Service Deployment
– Ability to template and image NFV devices
– Deployment is as easy as copying an image and
spinning up a new VM
– Integration with Orchestration Stack
Elasticity
– Ideal for situations where temporary but large
scale increases in traffic and services exist
Lower Deployment Costs
– No additional hardware to purchase, as long as
resources exist in virtual environment
The document provides an overview of the Juniper SDN landscape and Contrail solution. It begins with introducing the speaker and their background. It then discusses the need for SDN due to challenges in traditional networking. The current SDN landscape includes major players like Cisco, Juniper, VMware, OpenStack and smaller startups. Contrail is positioned as Juniper's SDN overlay solution that integrates with OpenStack and uses standard protocols like BGP, MPLS and XMPP to provide multi-tenancy, overlays, routing and gateway connectivity.
This document provides guidance on designing environments using VMware NSX-T. It discusses NSX-T's architecture components including the management plane, control plane, and data plane. It describes NSX-T's value in supporting heterogeneous environments across hypervisors, containers, clouds, and endpoints. The document is intended to help architects design NSX-T deployments and covers topics such as logical switching, routing, security, load balancing, and performance optimization. Design recommendations are provided for various deployment scenarios.
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
The success of today’s organizations and enterprises highly depends on reliable and secure connectivity. Enterprise connectivity exists between different branches, between a central offi ce and geographically widespread points of activity and between an enterprise and the public internet. The connectivity enables faster, more secure transactions and improved productivity by sharing information between entities,
no matter where they are.
Case Study: Anuta NCX empowers Telstra Cloud Gateway to deliver Global Interc...Kiran Sirupa
Telstra has pioneered Cloud Data Center
Interconnect (CDCI) technology to offer a one-stop-shop infrastructure as a service by connecting
multiple clouds to suit different customer requirements: vCloud Air for “Virtualized Environments, IBM
Soft Layer for “Bare Metal” applications such as legacy applications as well as Amazon AWS and
Microsoft Azure public cloud.
The document summarizes new hardware platforms from A10 Networks called the Thunder 5430S, 6430, and 6430S. These platforms provide high performance and scalability for large-scale virtualization and consolidation of up to 1024 tenants on a single device. They also enable on-demand premium cloud services and eliminate point solutions. The Thunder 6430S can deliver 150 Gbps of throughput in a 1 RU form factor and the Thunder 5430S provides 77 Gbps in a compact and efficient 1 RU design. Both platforms utilize FPGA and ASIC technology along with Intel Xeon CPUs to deliver maximum performance, security, and uptime.
This presentation examines cloud bursting with A10 Lightning ADS. With cloud bursting in A10 Lightning ADS, you can leverage AWS to dynamically add capacity in the cloud for applications deployed in the data center.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
A10 Networks (NYSE: ATEN), a leader in application networking and security, today expanded the Thunder TPS (Threat Protection System) family of high-performance solutions – to now include the industry’s biggest gun in the rapidly escalating war against DDoS attacks. Rounding out the product line are entry-level virtual and hardware appliance form factors, all with easy integration into existing networks, including open source systems, for faster deployment, plus the option to scale in cloud environments.
This document discusses Citrix's unification of its product portfolio and transition to new names. Key changes include Citrix ADC transitioning from NetScaler ADC, Citrix SD-WAN transitioning from NetScaler SD-WAN, and Citrix Gateway transitioning from NetScaler Unified Gateway and NetScaler Access Gateway among others. The goal is to create awareness and understanding of the portfolio changes to gain adoption of the new solutions while preserving equity in the old names as long as necessary.
ACOS 2.7.1 Release with Integrated WAF, AAM and DDoS ModulesA10 Networks
This document introduces new security modules in A10 Networks' ACOS 2.7.1 release, including an integrated web application firewall (WAF), application access management (AAM), and enhanced distributed denial of service (DDoS) protection. The WAF protects web applications from code vulnerabilities, the AAM provides centralized authentication, and the DDoS protection mitigates network and application attacks. These modules leverage ACOS's intelligent software platform and provide security services without additional licensing on A10 Thunder and AX Series models. The release also features usability enhancements, 165+ new features, and flexible deployment options.
View On-Demand :
http://ecast.opensystemsmedia.com/340
As distributed system scale up, so does their integration time and cost. This integration challenge is particularly acute for real-time and intelligent systems: increased connectivity cannot come at the expense of performance, reliability or resource consumption.
Adopting an inherently scalable architecture is the secret to agilely and affordably building systems that encompass ever more applications, nodes and real-time data. This webinar will review how you can apply proven integration techniques—such as loose coupling and service orientation—to demanding real-time systems. Unlike approaches designed for conventional business applications, the architecture we'll introduce is appropriate for systems that span embedded, high performance and IT applications.
This webinar targets software architects, chief engineers and development leads in all industries that design real-time and intelligent systems. This includes defense, industrial, transportation, medical and aerospace applications.
Better integration is increasingly the key to competitive advantage. It provides end-users with higher situational awareness, responsiveness and resource utilization. Don't let your architecture hold you back.
This document discusses cloud data center network architectures and how to scale them using Arista switches. It describes the limitations of legacy data center designs and introduces the cloud networking model. The cloud networking model with Arista switches provides benefits like lower latency, no oversubscription between racks, and the ability to scale to hundreds of racks. The document then discusses how to scale the network using layer 2, layer 3, and VXLAN designs from thousands to over a million nodes. It provides examples of scaling the number of leaf and spine switches to achieve greater node counts in a non-blocking two-tier design.
Enabling SDN for Service Providers by Khay Kid ChowMyNOG
1. The document discusses how programmable networks and network functions virtualization (NFV) enable new use cases and business models for service providers by making networks software-defined and services elastic.
2. Key aspects covered include centralizing network control, virtualizing network functions, and using orchestration to dynamically provision and monitor virtualized services across compute and network infrastructure on demand.
3. The benefits highlighted are automating network operations, enabling new self-service capabilities, and decreasing time to revenue through agile service creation.
This document provides an introduction to OpenStack, including:
- OpenStack is an open-source software platform for building private and public clouds with components that provide compute, storage, and networking capabilities.
- The OpenStack architecture is modular with components that can be used individually or together, including compute, networking, block storage, image service, object storage, identity service, and dashboard.
- Challenges of deploying OpenStack include needing skills in Linux, cloud infrastructure, and OpenStack architecture, as well as getting operations and engineering teams familiarized with OpenStack.
Software Defined Networking - Huawei, June 2017Novosco
An overview of Huawei Cloud Campus Networks and Software Defined Networking. Presented at Novosco's Network and Infrastructure event, Dublin, June 2017.
The document discusses simplifying cloud adoption with Cisco technologies. It describes the challenges of a multi-cloud environment and the benefits of building a private cloud with Cisco solutions for automation, orchestration, and networking. It also addresses how to define application priorities and dependencies to determine the best placement in public, private or hybrid clouds.
This document discusses network virtualization and how it provides virtual-to-physical network abstraction. It describes using logical networks to automate network services provisioning, enable microsegmentation for security, and augment physical network appliances. The key goals of network virtualization are also to make the network simple, scalable, high-bandwidth, fault-tolerant, and quality-of-service providing.
Session delivered by Scalar on Network Functions Virtualization. NFV allows for:
Rapid Service Deployment
– Ability to template and image NFV devices
– Deployment is as easy as copying an image and
spinning up a new VM
– Integration with Orchestration Stack
Elasticity
– Ideal for situations where temporary but large
scale increases in traffic and services exist
Lower Deployment Costs
– No additional hardware to purchase, as long as
resources exist in virtual environment
The document provides an overview of the Juniper SDN landscape and Contrail solution. It begins with introducing the speaker and their background. It then discusses the need for SDN due to challenges in traditional networking. The current SDN landscape includes major players like Cisco, Juniper, VMware, OpenStack and smaller startups. Contrail is positioned as Juniper's SDN overlay solution that integrates with OpenStack and uses standard protocols like BGP, MPLS and XMPP to provide multi-tenancy, overlays, routing and gateway connectivity.
This document provides guidance on designing environments using VMware NSX-T. It discusses NSX-T's architecture components including the management plane, control plane, and data plane. It describes NSX-T's value in supporting heterogeneous environments across hypervisors, containers, clouds, and endpoints. The document is intended to help architects design NSX-T deployments and covers topics such as logical switching, routing, security, load balancing, and performance optimization. Design recommendations are provided for various deployment scenarios.
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
The success of today’s organizations and enterprises highly depends on reliable and secure connectivity. Enterprise connectivity exists between different branches, between a central offi ce and geographically widespread points of activity and between an enterprise and the public internet. The connectivity enables faster, more secure transactions and improved productivity by sharing information between entities,
no matter where they are.
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
This document summarizes a presentation about VMware's NSX virtualized networking solution. It introduces NSX Edge gateways which provide routing, firewalling, load balancing, and VPN services. It discusses how NSX addresses the needs of cloud computing through automation, standard hardware, and a single management plane. Example use cases are shown. Key features of the NSX Edge including scalable performance are outlined. The document also briefly discusses NSX operations and management tools, and its deployment on VMware vCloud Hybrid Service.
Headquartered in Asia with coverage across the region and beyond, 1cloudstar is a pure-play Cloud Services Provider offering cloud-related consulting and professional services. 1cloudstar brings a deep understanding of what is possible when legacy systems and cloud solutions coexist and we have a clear vision of the digital future toward which this hybrid world is leading us. We combine those insights with our traditional Enterprise IT knowledge to drive innovation and transform complex environments into high-performance engines.
Whether you’re in the early stages of evaluating how the cloud can benefit your business, need guidance on developing a cloud strategy or how to integrate new cloud technology with their existing technology investments, 1cloudstar can leverage the skills and experience gained from many other enterprise cloud projects to ensure you achieve your business objectives.
1cloudstar’s unique strategic approach and engagement model ‘1cloudstar Engage’ combined with it’s cloud infrastructure and application integration skills sets the company apart from traditional technology system integrators. 1cloudstar’s team of consultants can leverage years of technology infrastructure and applications experience along with first hand experience of public, private and hybrid cloud projects to ensure your enterprise journey to cloud is a success.
1cloudstar accelerates the cloud-powered business, helping enterprises achieve real results from cloud applications and platforms.
Brk30176 enterprise class networking in azureAbou CONDE
The document discusses Microsoft's global network and Azure networking services. It highlights four pillars of Azure networking including connectivity options like ExpressRoute and VPN, security with features such as Azure Firewall and DDoS protection, traffic management with load balancing and content delivery, and monitoring. It provides overviews and updates on various Azure networking technologies and services.
Aryaka provides a network as a service that offers TCP optimization, quality of service controls, and a global private network to deliver consistent performance. Their SD-WAN technology enables link aggregation and reduced complexity at branch offices. The service integrates cloud/SaaS applications and provides network and application visibility through a customer portal. Customers experience faster branch office connectivity, cloud access, and deployments compared to MPLS or IP-VPN.
The document discusses the Brocade Virtual ADX, a virtual application delivery controller (ADC) platform. It provides a full-featured ADC system with a virtual footprint that leverages Intel technology. It can run on standard hypervisors and be hosted on x86 servers to provide load balancing, application security, and other services. It uses a distributed multi-core architecture to scale performance elastically. The Brocade Virtual ADX supports various load balancing methods and application health checks. It also provides scripting, global load balancing, and other features to optimize application delivery in virtualized environments.
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
The document discusses Cisco SD-WAN and its advantages over traditional and legacy WAN architectures. It highlights how Cisco SD-WAN uses a centralized control plane and software-defined intelligence to provide automated, predictive, and intent-based networking. This allows for flexible, scalable, and secure connectivity across hybrid WAN transports in a way that is simpler to manage and operate than hardware-centric WAN solutions.
Switch Cisco Catalyst 9300 Datasheet (2022).pdfSAM Romania
Cisco® Catalyst® 9300 Series switches are Cisco’s lead stackable enterprise access switching platform and as part of the Catalyst 9000 family, are build to transform your network to handle a hybrid world where the workplace is anywhere, endpoints could be anything, and applications are hosted all over the place.Datasheet.
https://www.sam-romania.ro/
Achieve high throughput: A case study using a Pensando Distributed Services C...Principled Technologies
Many options are available to cloud providers trying to meet customer need for ever-greater levels of performance and scalability. In our hands-on cloud workload tests in two SDN implementations, the environment based on the Pensando DSC-200 outperformed the environment based on the NVIDIA Mellanox ConnectX-6 Dx SmartNIC in terms of both packet rate throughput and total throughput in Gbps. It also achieved much lower latency. These findings demonstrate that the Pensando architecture holds strong potential for organizations that depend on cloud technologies.
VPNs provide flexibility, scalability, and lower costs compared to traditional private networks. A VPN allows connectivity on a shared infrastructure like the internet while maintaining private network policies and performance. Common types are access VPNs for remote access, intranet VPNs for connectivity between corporate offices, and extranet VPNs for connections to business partners. VPNs use tunneling and encryption protocols to securely transport network traffic across public or untrusted networks.
This document discusses Citrix's hybrid multi-cloud and networking solutions. It begins by noting that most enterprises today have a hybrid/multi-cloud strategy and use multiple public cloud environments. It then outlines some of the key benefits Citrix networking provides, such as avoiding cloud lock-in, a consistent user experience across environments, and centralized security and performance monitoring. The rest of the document provides examples of how Citrix SD-WAN solutions have helped customers by optimizing cloud performance and connectivity, prioritizing application traffic, and ensuring reliable access across different network links.
This module covers VPN and IPsec concepts, including how VPNs use encryption protocols like IPsec to securely connect site-to-site and remote networks. It describes different types of VPNs for remote access and connecting sites, as well as how the IPsec framework provides confidentiality, integrity, authentication, and secure key exchange to protect network traffic. The module also examines IPsec encapsulation modes and the benefits of dynamic VPN solutions like DMVPN and IPsec VTIs.
if your are always confused about ip tunneling L2/L3 tunneling ipsec acces vpn u have to come to right place This presentation in pdf will get you started on right path towards tunnling concept & implementaion
Array Networks develops purpose-built systems for deploying virtual networking and security functions with guaranteed
performance. Proven around the world, Array is recognized by leading enterprises and service providers for next-generation
technology that delivers agility at scale.
This document provides an overview of the evolution of the internet and key technologies enabling it, including internet of things (IoT), 5G, cloud computing, data centers, and network virtualization. It discusses how IoT and cloud computing produce big data stored in data centers, and how 5G, data centers, and network virtualization technologies will act as the backbone for cloud services and IoT applications. It also outlines some of the applications, requirements, and trends related to these technologies.
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoThousandEyes
Learn how companies are leveraging hybrid WAN for branch, remote and main office sites while preserving visibility and insight with the ThousandEyes and Cisco integrated solution.
Transforming DCI connectivity with the FSP 3000 S-FlexAdtran
Our market-first FSP 3000 S-Flex™ is a highly versatile DWDM muxponder able to support 64Gbit/s Fibre Channel services. It boosts total transport capacity to 400Gbit/s, simplifies operations and streamlines inventories. S-Flex™ caters to enterprises’ diverse needs by seamlessly supporting a comprehensive range of DCI and SAN protocols and speeds. With a highly secure variant safeguarded by Adva Network Security’s ConnectGuard™ encryption, it also offers robust data protection, even in the face of quantum computer attacks.
NSX SD-WAN by VeloCloud is VMware's SD-WAN solution that was acquired by VMware in 2017. It has over 2,000 customers, 70,000+ sites, and powers some of the world's largest enterprise SD-WAN deployments. It leads the global SD-WAN market with close to 30% market share. The document discusses NSX SD-WAN by VeloCloud's capabilities including simplified WAN management, assured application performance, segmentation, zero-touch deployment, and its advantages over legacy networks.
Similar to A10 Networks: Delivering Data Center to Data Center communications securely (20)
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Best 20 SEO Techniques To Improve Website Visibility In SERP
A10 Networks: Delivering Data Center to Data Center communications securely
1. SOLUTION BRIEF
1
Data Privacy Challenges
Organizations of all sizes rely on IPsec VPNs to prevent snooping and data theft and to
address compliance. IPsec provides a cost-effective and secure way to transfer data over
IP networks.
While IPsec is a mature and well understood technology, new networking paradigms like
cloud computing, as well as escalating bandwidth requirements, are compelling large
enterprises and service providers to rethink their VPN strategies. As a result, organizations
need to develop VPN architectures that can:
• Support unprecedented IPsec throughput levels
• Leverage BGP routing for high availability and rapid scaling
• Spin up new IPsec tunnels and gateways on-demand in cloud environments
• Minimize power consumption and rack space requirements for data center efficiency
Organizations need a solution they can trust to deliver reliable IPsec connectivity, and one
that can interoperate with their existing routers and IPsec VPN gateways.
High-Speed IPsec Encryption with A10
A10 Networks® Thunder® ADC line of Application Delivery Controllers includes IPsec
encryption capabilities that enable enterprises and service providers to build out large-scale
VPN deployments. By supporting up to 20,000 VPN tunnels per Thunder ADC platform and a
broad array of encryption algorithms and data integrity methods, organizations can deploy
Thunder ADC alongside their existing VPN equipment or build out new VPN networks with
Thunder ADC appliances.
Thunder ADC supports a comprehensive set of features in addition to IPsec VPN, including
advanced server load balancing, Network Address Translation (NAT), IPv4 and IPv6 routing,
and access control lists. By delivering a wide range of networking features, organizations can
support complex network designs and granularly control access to remote resources without
needing to deploy and manage numerous appliances. All of these features, in addition to
IPsec, are provided standard with Thunder ADC as part of A10’s all-inclusive licensing.
High Availability and Rapid Scaling
For many organizations, VPNs serve business critical functions such as data migration,
disaster recovery, remote user access, and connecting data centers to cloud networks.
Regardless of the use case, organizations depend on VPNs to run their business and these
VPNs must always be available.
THUNDER ADC IPSEC VPN
Encrypt Traffic on a Massive Scale and in the Cloud
Challenge:
To protect communications,
organizations need to encrypt data at
high speed and scale out VPN tunnel
capacity on-demand.
Solution:
A10 Networks empowers organizations
to reduce their data center footprint
and ensure data privacy with integrated,
high-performance IPsec VPN and load
balancing.
Benefits:
• Consolidate IPsec VPN, server load
balancing and stateful firewall
functionality
• Encrypt data at unparalleled speeds
• Reduce rack space and power
requirements
• Scale capacity by launching new VPN
gateways on-demand
2. 2
Thunder ADC supports an array of clustering, high availability and
dynamic routing features that maximize uptime, not just for IPsec VPN
routes but also to ensure connectivity to servers and applications. High
availability and scaling features include:
• Route monitoring and failover – Using A10’s enhanced
Virtual Router Redundancy Protocol implementation, VRRP-a,
Thunder ADC can monitor route and VPN gateway failures
and rapidly failover traffic to a passive Thunder ADC appliance.
Supporting up to eight appliances in a cluster, VRRP-a can detect
unresponsive services, servers and applications and identify
infrastructure failures. With A10 Virtual Chassis System (aVCS®),
multiple A10 devices can function as a single virtual chassis, with
a single point of control and centralized statistics.
• Intelligent routing to increase VPN capacity – Thunder ADC
supports Border Gateway Protocol (BGP) routing, which not only
allows BGP routers to communicate across IPsec VPN tunnels
but also enables organizations to boost IPsec capacity simply by
deploying more Thunder ADC appliances. Using BGP, Thunder
ADC deployments can scale to support terabit bandwidth
requirements without complicated network designs or forklift
hardware upgrades, and they can deploy more Thunder ADC
appliances to increase IPsec throughput. VRRP-a integrates with
BGP to inject routes and ensure smooth route failovers. Thunder
ADC also supports Bidirectional Forwarding Detection (BFD) for
fast path failure detection and route convergence.
• Bandwidth aggregation by load balancing traffic over
multiple paths – Thunder ADC leverages Equal-Cost Multipath
(ECMP) routing to increase total IPsec VPN bandwidth. ECMP,
combined with BGP, allows routers to support multiple network
routes simultaneously, allowing Thunder ADC to load balance
traffic across multiple paths to boost overall VPN capacity.
Cloud and On-demand Provisioning
Organizations are moving their infrastructure to the cloud to optimize
computing efficiency and lower capital and operating expenses.
As they migrate to the cloud, they need their VPN infrastructure to
migrate with them. However, cloud architectures introduce new
requirements that do not exist in physical data center networks.
To realize the benefits of cloud computing, cloud architectures
must support automation, agility and on-demand scaling. And,
organizations must ensure that their VPN services support this new
cloud networking paradigm. VPN services should integrate seamlessly
with application networking services, SDN technologies and other
data center infrastructure. Organizations should be able to provision
VPN instances with the same cloud orchestration systems they use to
manage their cloud applications.
Thunder ADC empowers organizations to implement high-capacity
VPN services in the cloud. Supporting an array of form factors,
including high-performance virtual appliances, physical appliances
and hybrid virtual appliances, A10 provides organizations the flexibility
to build a VPN architecture that meets the unique requirements of
cloud networks.
Thunder ADC integrates with software defined network (SDN) fabrics
using Virtual Extensible LAN (VXLAN) and Network Virtualization
using Generic Routing Encapsulation (NVGRE) to support automated
network configuration and service chaining support. Integration with
cloud orchestration platforms such as Microsoft System Center Virtual
Machine Manager (SCVMM) and OpenStack, enables centralized
provisioning of VPN services. Pay-as-you-go licensing with utility and
rental billing models allows organizations to align VPN licensing with
the licensing models of other cloud-based services. aCloud Services
Architecture enables cloud data center operators to deliver advanced
application delivery and IPsec VPN services while improving agility.
The high availability, scalability and security features supported in
physical networks, such as dynamic routing and redundancy, are also
supported in cloud environments. This means that organizations can
leverage BGP routing and VRRP-a to scale out their VPN networks and
to maximize uptime.
Internet
BGP Cloud
Thunder ADC 1 Thunder ADC 2
• IPsec VPN
• Access Control Lists
• BGP
• BFD
Data Center
Multi-Site VPN
Thunder ADC n
Thunder ADC
VPN Site 2
Thunder ADC
VPN Site 1
Thunder ADC
VPN Site 3
Encrypted VPN
Tunnel
• IPsec VPN
• Access Control Lists
• BGP
• BFD
Figure 1: Thunder ADC can connect to multiple VPN sites over a BGP cloud.
3. 3
High-Performance Architecture
Thunder ADC leverages unique software and hardware design
advantages to deliver exceptional IPsec performance. The A10
Networks Advanced Core Operating System (ACOS®) powers
Thunder ADC appliances. Built from the ground up to maximize
the performance of multicore CPU architectures, ACOS can linearly
scale compute processing as more CPU cores are added, providing
unparalleled performance in a compact form factor.
ACOS uses scalable symmetric multiprocessing (SSMP) to leverage
supercomputing techniques for parallel processing and to maximize
the performance of multicore architectures. Due to its highly scalable
64-bit operating system optimized for multicore architectures, Thunder
ADC hardware and A10 Networks vThunder® ADC line of virtual
appliances deliver unmatched IPsec VPN performance.
Select Thunder ADC hardware models include dedicated security
processors that accelerate IPsec encryption speed. Supporting up to four
quad-chip security processors on a rack-mountable appliance, Thunder
ADC provides fast IPsec encryption without forcing organizations to
deploy cumbersome and inefficient chassis-based systems.
• IPsec VPN
• BGP
• ECMP
• IPsec VPN
• BGP
• ECMP
Internet
Thunder ADC Thunder ADC
Router
Users Users
Firewall
Thunder ADC Thunder ADC Thunder ADC Thunder ADC
RouterFirewall
Figure 2: Users can forward traffic destined for the remote VPN site through the Thunder ADC appliance and
send all other traffic directly to the Internet.
IPsec VPN Specifications
Keying Methods
• IKEv1, IKEv2
Authentication Methods
• RSA Signature, Pre-shared Key, PKI
Key Exchange Diffie-Hellman Groups
• 1, 2, 5, 14, 15, 16, 18
Encryption Algorithms
• DES, 3DES, AES-128, AES-192, AES-256
Data Integrity
• DES, 3DES, AES-128, AES-192, AES-256
Maximum Number of IPsec Tunnels Supported
• 20,000i
RFCs Supported
• RFC 6071, 2407, 2408, 2409, 3526, 3706, 3947, 7296, 4307, IANA-
IKEv2, 4301, 4303, 4308, 3602, 3986, 4304, 4868 (partial), 2560,
5280, draft-nourse-scep
IPsec VPN Features
• NAT traversal
• Dead peer detection
• Perfect Forward Secrecy (PFS) supportii
• Life bytes and time rekey
• Extended Sequence Number (ESN)
• L3V partition aware
• Route-based VPN
• OSPF, BGP and Bidirectional Forwarding Detection (BFD) over
IPsec tunnel
• ECMP support
• Integration with server load balancing and Network Address
Translation (NAT
• UDP encapsulation
• TCP maximum segment size (MSS) clamping
• Public key infrastructure (PKI) support with Simple Certificate
Enrollment Protocol (SCEP), Online Certificate Status Protocol
(OCSP) and certificate revocation list (CRL) distribution points
• Prioritized Internet Key Exchange (IKE) packets for hardware-
accelerated Flexible Traffic Accelerator (FTA) appliance models
• Software and hardware-based encryption, with dedicated
security processors in select hardware models
Cloud Integration
• Integration with cloud orchestration systems such as Microsoft
SCVMM, OpenStack and VMware vCloud Director
• vThunder virtual appliance support
• On-demand provisioning of data-driven and command-driven
tunnels
High Availability
• Virtual Router Redundancy Protocol (VRRP-a)
• Security Association (SA) sync and session sync
• Active – Active topology support
• Sub-second failover with BFD and route health check
i
Actual maximum number of supported VPN tunnels may vary by appliance model.
ii
Available in ACOS 4.0.1