SlideShare a Scribd company logo
Feeling Agile Network
Your Needs…
Web/ProxyApp Server-Group
Remote officeEmployee CustomerBYOD GuestDumb terminal
ICP App Server
EDC DMZ
BYOD visits dumb
terminal
Employee visits
dumb terminal
Employee
communication
Simple, Secure, Controlled
Agility Features Create an Agile Network
Web/ProxyApp Server-Group
员工 BYOD
ICP App Server
EDC DMZ
Service layer
Network layer
User layer
Intrane
t
eSightController Agile Switch
InternetInternet
Service Orchestration
Specified data traffic forwarding path
Free Mobility
On-demand access control
SVF
1.1 Plug-and-play network devices
1.2 Centralized configuration of service templates
1.3 Uniform wired and wireless network monitoring
iPCA
Quick E2E fault location
50
2
1
3
5 4Unified Security
Remote office Customer
Lifecycle  Agility Features
Network
Design
Fault
Location
1 SVF
1.1 Plug-and-Play
1
SVF
1.2 Centralized Configuration
50
2 Free
Mobility
3 Service
Orchestration
4 Unified
Security
iPCA
5
Service
Deployment
Routine
Monitoring
1.1 SVF-> Plug-and-Play
SVF-Parent
SVF-Client
3. Automatically create management channels
AS and AP are virtualized.
 Shield differences of wired and
wireless networks and transmit traffic of
ASs and APs over same management
channels (CAPWAP)
2. Power on
SVF-Client
1. Pre-deployment
• Configure management channel
• Add port to virtual group
eSight
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
1.1 SVF-> Plug-and-Play Experience
1. Display topology after pre-deployment
2. Power on the new device, plug-and-play
3. Clients are vertically virtualized and displayed
under Parent
4. Parent panel shows vertically virtualized topology
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
Lifecycle  Agility Features
Network
Design
Fault
Location
1 SVF
1.1 Plug-and-Play
1
SVF
1.2 Centralized
Configuration
50
2 Free
Mobility
3 Service
Orchestration
4 Unified
Security
iPCA
5
Service
Deployment
Routine
Monitoring
1.2 SVF-> Centralized Configuration
SVF-Parent
SVF-ClientSVF-Client
Ethernet WiFi
Service Profile
User
Group
 Parent: uses same service profiles for
wired and wireless users
 Client: automatically delivers
parameters based on type of access
devices
 User: adapts to the authentication
method based on access interface type
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
Lifecycle  Agility Features
Network
Design
Fault
Location
1 SVF
1.1 Plug-and-Play
1
SVF
1.2 Centralized Configuration
50
2 Free
Mobility
3 Service
Orchestration
4 Unified
Security
iPCA
5
Service
Deployment
Routine
Monitoring
2 Free Mobility
Phase 1
2
Administrator configures user and
resource access rights on Agile Controller.
Agile Controller translates the
configuration into machine language and
delivers it to devices on the entire network.
When a user logs in, the policy
enforcement point obtains user
rights configured based on 5W1H
conditions, and enforces the
access policy.
Deploy policies
Enforce policies
Deliver policies
Service flow
Policy enforcement pointWAN/Internet
Agile Controller
WAN/Internet
Email, ERP,
code…
HQ access:
R&D/sales/guests…
Branch access:
R&D/sales/guests…
Internet:
R&D/sales…
NGFW
SW
SW
SW
SW
NGFW
SVN
Centralized policy control allows network resources to
migrate with mobile users
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
Data Center
Phase
2 Free Mobility Experience
1. Pre-Configure policies 2. Obtain Access policies based on 5W1H
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
Lifecycle  Agility Features
Network
Design
Fault
Location
1 SVF
1.1 Plug-and-Play
1
SVF
1.2 Centralized Configuration
50
2 Free
Mobility
3 Service
Orchestration
4 Unified
Security
iPCA
5
Service
Deployment
Routine
Monitoring
3 Service Orchestration
Functions:
Security resources are concentrated in
a resource center to allow flexible
allocation of security capabilities
based on attributes such as resources,
users, and zones, improving security
protection capabilities of the entire
network.
Typical applications:
 Guest online behavior management
 Virus cleaning
Security resource
center
User Group Resource Group
Internet
Tunnel
Tunnel
Agile Switch
Security policy ASG
Online behavior
management
NGFW
Firewall
Agile
Controller
Security policy
Tunnel
Service flow
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
3 Service Orchestration Experience
1. Agile switch GRE Security resource center 2. Flexible service orchestration based on
service scenarios
Simply drag the
mouse
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
Lifecycle  Agility Features
Network
Design
Fault
Location
1 SVF
1.1 Plug-and-Play
1
SVF
1.2 Centralized Configuration1
SVF
1.3 Unified
Management
50
2 Free
Mobility
3 Service
Orchestration
4 Unified
Security
iPCA
5
Service
Deployment
Routine
Monitoring
4 Unified Security
① Security event collection
Collect event logs from network devices, security devices,
servers, and terminals.
② Big Data analytics
Analyze a huge amount of correlated log information to
show security condition of the entire network and detect
security risks.
③ Network security evaluation
Evaluate security threat severity on the entire network,
show the attack topology, and identify top-risky assets
and zones to provide information for network security
protection.
④ Security correlation and active defense
Agile Controller delivers adjusted security policies to
related devices in response to security events. For
example, the devices can log out users or block traffic
from these users.
Log collection
Security policies
take effect
②Big Data analytics
③ Network security evaluation
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
4 Unified Security Experience
1. Network-wide or
domain-wide
security threat
evaluation
2. Focus on TOPN
risky assets
3. Drill-down domain-wide threat
status, view security detail
information and handling
suggestions
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
Lifecycle  Agility Features
Network
Design
Fault
Location
1 SVF
1.1 Plug-and-Play
1
SVF
1.2 Centralized Configuration
50
2 Free
Mobility
3 Service
Orchestration
4 Unified
Security
iPCA
5
Service
Deployment
Routine
Monitoring
5 iPCA
Network
Management
eSight
Agile Switch
Operators
leased
network
Shenzhen
Headquarters
Beijing Branch
 Mark
1. Device/Link
3. WAN Egress
2. End to End
 Stat.
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
5 iPCA Experience
1.Device/Link-level measurement
2. End-to-end quick measurement
Network
Design
Service
Deployment
Routine
Monitoring
Fault
Location
3-1. Create a conservation domain
3-2. Conservation domain measurement
Agile Network Agile Management

More Related Content

What's hot

The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
Cisco Canada
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data Broker
Robb Boyd
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session
Cisco Canada
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Cisco Canada
 
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Martin Lipka
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017
Novosco
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
Robb Boyd
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Canada
 
Aci presentation
Aci presentationAci presentation
Aci presentation
Joe Ryan
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
Cisco Mobility
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
Cisco Canada
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Canada
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
Matteo Masi
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
Debra Jennings
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITB
SDNRG ITB
 
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Canada
 
The Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformThe Enhanced Cisco Container Platform
The Enhanced Cisco Container Platform
Robb Boyd
 
IoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-endIoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-end
Pilgrim Beart
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
Enterprise Management Associates
 

What's hot (20)

The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data Broker
 
Ottawa e-NFV Session
Ottawa e-NFV Session Ottawa e-NFV Session
Ottawa e-NFV Session
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Aci presentation
Aci presentationAci presentation
Aci presentation
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITB
 
Ons 2013-nv
Ons 2013-nvOns 2013-nv
Ons 2013-nv
 
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM...
 
The Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformThe Enhanced Cisco Container Platform
The Enhanced Cisco Container Platform
 
IoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-endIoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-end
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 

Similar to Agile Network Agile Management

The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
Cisco Canada
 
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
OPNFV
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Trinath Somanchi
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Cisco Russia
 
Innovations in Mobility
Innovations in MobilityInnovations in Mobility
Innovations in Mobility
Cisco Canada
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Winston Morton
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
Nur Shiqim Chok
 
Cloud native microservices for systems and applications ieee rev2
Cloud native microservices for systems and applications ieee rev2Cloud native microservices for systems and applications ieee rev2
Cloud native microservices for systems and applications ieee rev2
Prem Sankar Gopannan
 
Cloud Automation Manager
Cloud Automation ManagerCloud Automation Manager
Cloud Automation Manager
Nithin Babu
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
Dhani Ahmad
 
APT iTest and Velocity 7.3 Use Cases.pptx
APT iTest and Velocity 7.3 Use Cases.pptxAPT iTest and Velocity 7.3 Use Cases.pptx
APT iTest and Velocity 7.3 Use Cases.pptx
RajeshParmar99
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
5nine
 
Huawei AC6508 Wireless Access Controller Datasheet.pdf
Huawei AC6508 Wireless Access Controller Datasheet.pdfHuawei AC6508 Wireless Access Controller Datasheet.pdf
Huawei AC6508 Wireless Access Controller Datasheet.pdf
Bruno Rafael
 
Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1
Spiceworks
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
Motty Ben Atia
 
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. LouisDave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
World Wide Technology
 
Cisco Prime for IP NGN
Cisco Prime for IP NGNCisco Prime for IP NGN
Cisco Prime for IP NGN
Cisco Canada
 
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PROIDEA
 
Introducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis MeetupIntroducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis Meetup
djzook
 

Similar to Agile Network Agile Management (20)

The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
Securing your nfv and sdn integrated open stack cloud- challenges, use-cases ...
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
Innovations in Mobility
Innovations in MobilityInnovations in Mobility
Innovations in Mobility
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015
 
ASPEN
ASPENASPEN
ASPEN
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
Cloud native microservices for systems and applications ieee rev2
Cloud native microservices for systems and applications ieee rev2Cloud native microservices for systems and applications ieee rev2
Cloud native microservices for systems and applications ieee rev2
 
Cloud Automation Manager
Cloud Automation ManagerCloud Automation Manager
Cloud Automation Manager
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
APT iTest and Velocity 7.3 Use Cases.pptx
APT iTest and Velocity 7.3 Use Cases.pptxAPT iTest and Velocity 7.3 Use Cases.pptx
APT iTest and Velocity 7.3 Use Cases.pptx
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
Huawei AC6508 Wireless Access Controller Datasheet.pdf
Huawei AC6508 Wireless Access Controller Datasheet.pdfHuawei AC6508 Wireless Access Controller Datasheet.pdf
Huawei AC6508 Wireless Access Controller Datasheet.pdf
 
Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
 
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. LouisDave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
Dave Chandler Presents SDN at World Wide Technology's TECday - St. Louis
 
Cisco Prime for IP NGN
Cisco Prime for IP NGNCisco Prime for IP NGN
Cisco Prime for IP NGN
 
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
 
Introducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis MeetupIntroducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis Meetup
 

More from Huawei Enterprise Hong Kong

Practitioner's perspective on High Performance Computing services for innovat...
Practitioner's perspective on High Performance Computing services for innovat...Practitioner's perspective on High Performance Computing services for innovat...
Practitioner's perspective on High Performance Computing services for innovat...
Huawei Enterprise Hong Kong
 
Open ROADS to a Better Connected Economy
Open ROADS to a Better Connected EconomyOpen ROADS to a Better Connected Economy
Open ROADS to a Better Connected Economy
Huawei Enterprise Hong Kong
 
Let’s Flash Now! Reshaping IT to Business Transformation Towards the Digital Era
Let’s Flash Now! Reshaping IT to Business Transformation Towards the Digital EraLet’s Flash Now! Reshaping IT to Business Transformation Towards the Digital Era
Let’s Flash Now! Reshaping IT to Business Transformation Towards the Digital Era
Huawei Enterprise Hong Kong
 
Leading the Way in Intelligent Data Center Infrastructure
Leading the Way in Intelligent Data Center InfrastructureLeading the Way in Intelligent Data Center Infrastructure
Leading the Way in Intelligent Data Center Infrastructure
Huawei Enterprise Hong Kong
 
Huawei Solutions for SAP HANA Overview
Huawei Solutions for SAP HANA OverviewHuawei Solutions for SAP HANA Overview
Huawei Solutions for SAP HANA Overview
Huawei Enterprise Hong Kong
 
New Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end Storage
New Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end StorageNew Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end Storage
New Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end Storage
Huawei Enterprise Hong Kong
 
Cloud Network Technology Development & Deployment Trends
Cloud Network  Technology Development & Deployment TrendsCloud Network  Technology Development & Deployment Trends
Cloud Network Technology Development & Deployment Trends
Huawei Enterprise Hong Kong
 
Huawei Helps CMB Construct a Big Data Platform for Financial IT Transformation
Huawei Helps CMB Construct a Big Data Platform for Financial IT TransformationHuawei Helps CMB Construct a Big Data Platform for Financial IT Transformation
Huawei Helps CMB Construct a Big Data Platform for Financial IT Transformation
Huawei Enterprise Hong Kong
 
Create New Value for You - Huawei Agile Network
Create New Value for You - Huawei Agile NetworkCreate New Value for You - Huawei Agile Network
Create New Value for You - Huawei Agile Network
Huawei Enterprise Hong Kong
 
Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...
Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...
Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...
Huawei Enterprise Hong Kong
 
Create New Value for You - Huawei Professional Services
Create New Value for You - Huawei Professional ServicesCreate New Value for You - Huawei Professional Services
Create New Value for You - Huawei Professional Services
Huawei Enterprise Hong Kong
 
A Smart Cloud Makes Cities Smarter
A Smart Cloud Makes Cities SmarterA Smart Cloud Makes Cities Smarter
A Smart Cloud Makes Cities Smarter
Huawei Enterprise Hong Kong
 
Redefine Your Datacenter Infrastructure by 3rd Platform
Redefine Your Datacenter Infrastructure by 3rd PlatformRedefine Your Datacenter Infrastructure by 3rd Platform
Redefine Your Datacenter Infrastructure by 3rd Platform
Huawei Enterprise Hong Kong
 
飛翔在雲端
飛翔在雲端飛翔在雲端
Make IT Simple, Make Business Agile
Make IT Simple, Make Business AgileMake IT Simple, Make Business Agile
Make IT Simple, Make Business Agile
Huawei Enterprise Hong Kong
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for Services
Huawei Enterprise Hong Kong
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for Services
Huawei Enterprise Hong Kong
 
Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli...
 Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli... Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli...
Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli...
Huawei Enterprise Hong Kong
 

More from Huawei Enterprise Hong Kong (20)

Practitioner's perspective on High Performance Computing services for innovat...
Practitioner's perspective on High Performance Computing services for innovat...Practitioner's perspective on High Performance Computing services for innovat...
Practitioner's perspective on High Performance Computing services for innovat...
 
Open ROADS to a Better Connected Economy
Open ROADS to a Better Connected EconomyOpen ROADS to a Better Connected Economy
Open ROADS to a Better Connected Economy
 
Let’s Flash Now! Reshaping IT to Business Transformation Towards the Digital Era
Let’s Flash Now! Reshaping IT to Business Transformation Towards the Digital EraLet’s Flash Now! Reshaping IT to Business Transformation Towards the Digital Era
Let’s Flash Now! Reshaping IT to Business Transformation Towards the Digital Era
 
Leading the Way in Intelligent Data Center Infrastructure
Leading the Way in Intelligent Data Center InfrastructureLeading the Way in Intelligent Data Center Infrastructure
Leading the Way in Intelligent Data Center Infrastructure
 
Huawei Solutions for SAP HANA Overview
Huawei Solutions for SAP HANA OverviewHuawei Solutions for SAP HANA Overview
Huawei Solutions for SAP HANA Overview
 
Huawei solution for sap hana
Huawei solution for sap hanaHuawei solution for sap hana
Huawei solution for sap hana
 
Huawei it l strategy
Huawei it l strategyHuawei it l strategy
Huawei it l strategy
 
New Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end Storage
New Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end StorageNew Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end Storage
New Benchmark for High-end Storage - Huawei OceanStor 18000 V3 High-end Storage
 
Cloud Network Technology Development & Deployment Trends
Cloud Network  Technology Development & Deployment TrendsCloud Network  Technology Development & Deployment Trends
Cloud Network Technology Development & Deployment Trends
 
Huawei Helps CMB Construct a Big Data Platform for Financial IT Transformation
Huawei Helps CMB Construct a Big Data Platform for Financial IT TransformationHuawei Helps CMB Construct a Big Data Platform for Financial IT Transformation
Huawei Helps CMB Construct a Big Data Platform for Financial IT Transformation
 
Create New Value for You - Huawei Agile Network
Create New Value for You - Huawei Agile NetworkCreate New Value for You - Huawei Agile Network
Create New Value for You - Huawei Agile Network
 
Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...
Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...
Huawei Professional Channel Service Partnering for Success - Huawei Fusion C...
 
Create New Value for You - Huawei Professional Services
Create New Value for You - Huawei Professional ServicesCreate New Value for You - Huawei Professional Services
Create New Value for You - Huawei Professional Services
 
A Smart Cloud Makes Cities Smarter
A Smart Cloud Makes Cities SmarterA Smart Cloud Makes Cities Smarter
A Smart Cloud Makes Cities Smarter
 
Redefine Your Datacenter Infrastructure by 3rd Platform
Redefine Your Datacenter Infrastructure by 3rd PlatformRedefine Your Datacenter Infrastructure by 3rd Platform
Redefine Your Datacenter Infrastructure by 3rd Platform
 
飛翔在雲端
飛翔在雲端飛翔在雲端
飛翔在雲端
 
Make IT Simple, Make Business Agile
Make IT Simple, Make Business AgileMake IT Simple, Make Business Agile
Make IT Simple, Make Business Agile
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for Services
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for Services
 
Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli...
 Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli... Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli...
Wired and Wireless In-Depth Convergence Through eSight, Significantly Simpli...
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Agile Network Agile Management

  • 2. Your Needs… Web/ProxyApp Server-Group Remote officeEmployee CustomerBYOD GuestDumb terminal ICP App Server EDC DMZ BYOD visits dumb terminal Employee visits dumb terminal Employee communication Simple, Secure, Controlled
  • 3. Agility Features Create an Agile Network Web/ProxyApp Server-Group 员工 BYOD ICP App Server EDC DMZ Service layer Network layer User layer Intrane t eSightController Agile Switch InternetInternet Service Orchestration Specified data traffic forwarding path Free Mobility On-demand access control SVF 1.1 Plug-and-play network devices 1.2 Centralized configuration of service templates 1.3 Uniform wired and wireless network monitoring iPCA Quick E2E fault location 50 2 1 3 5 4Unified Security Remote office Customer
  • 4. Lifecycle  Agility Features Network Design Fault Location 1 SVF 1.1 Plug-and-Play 1 SVF 1.2 Centralized Configuration 50 2 Free Mobility 3 Service Orchestration 4 Unified Security iPCA 5 Service Deployment Routine Monitoring
  • 5. 1.1 SVF-> Plug-and-Play SVF-Parent SVF-Client 3. Automatically create management channels AS and AP are virtualized.  Shield differences of wired and wireless networks and transmit traffic of ASs and APs over same management channels (CAPWAP) 2. Power on SVF-Client 1. Pre-deployment • Configure management channel • Add port to virtual group eSight Network Design Service Deployment Routine Monitoring Fault Location
  • 6. 1.1 SVF-> Plug-and-Play Experience 1. Display topology after pre-deployment 2. Power on the new device, plug-and-play 3. Clients are vertically virtualized and displayed under Parent 4. Parent panel shows vertically virtualized topology Network Design Service Deployment Routine Monitoring Fault Location
  • 7. Lifecycle  Agility Features Network Design Fault Location 1 SVF 1.1 Plug-and-Play 1 SVF 1.2 Centralized Configuration 50 2 Free Mobility 3 Service Orchestration 4 Unified Security iPCA 5 Service Deployment Routine Monitoring
  • 8. 1.2 SVF-> Centralized Configuration SVF-Parent SVF-ClientSVF-Client Ethernet WiFi Service Profile User Group  Parent: uses same service profiles for wired and wireless users  Client: automatically delivers parameters based on type of access devices  User: adapts to the authentication method based on access interface type Network Design Service Deployment Routine Monitoring Fault Location
  • 9. Lifecycle  Agility Features Network Design Fault Location 1 SVF 1.1 Plug-and-Play 1 SVF 1.2 Centralized Configuration 50 2 Free Mobility 3 Service Orchestration 4 Unified Security iPCA 5 Service Deployment Routine Monitoring
  • 10. 2 Free Mobility Phase 1 2 Administrator configures user and resource access rights on Agile Controller. Agile Controller translates the configuration into machine language and delivers it to devices on the entire network. When a user logs in, the policy enforcement point obtains user rights configured based on 5W1H conditions, and enforces the access policy. Deploy policies Enforce policies Deliver policies Service flow Policy enforcement pointWAN/Internet Agile Controller WAN/Internet Email, ERP, code… HQ access: R&D/sales/guests… Branch access: R&D/sales/guests… Internet: R&D/sales… NGFW SW SW SW SW NGFW SVN Centralized policy control allows network resources to migrate with mobile users Network Design Service Deployment Routine Monitoring Fault Location Data Center Phase
  • 11. 2 Free Mobility Experience 1. Pre-Configure policies 2. Obtain Access policies based on 5W1H Network Design Service Deployment Routine Monitoring Fault Location
  • 12. Lifecycle  Agility Features Network Design Fault Location 1 SVF 1.1 Plug-and-Play 1 SVF 1.2 Centralized Configuration 50 2 Free Mobility 3 Service Orchestration 4 Unified Security iPCA 5 Service Deployment Routine Monitoring
  • 13. 3 Service Orchestration Functions: Security resources are concentrated in a resource center to allow flexible allocation of security capabilities based on attributes such as resources, users, and zones, improving security protection capabilities of the entire network. Typical applications:  Guest online behavior management  Virus cleaning Security resource center User Group Resource Group Internet Tunnel Tunnel Agile Switch Security policy ASG Online behavior management NGFW Firewall Agile Controller Security policy Tunnel Service flow Network Design Service Deployment Routine Monitoring Fault Location
  • 14. 3 Service Orchestration Experience 1. Agile switch GRE Security resource center 2. Flexible service orchestration based on service scenarios Simply drag the mouse Network Design Service Deployment Routine Monitoring Fault Location
  • 15. Lifecycle  Agility Features Network Design Fault Location 1 SVF 1.1 Plug-and-Play 1 SVF 1.2 Centralized Configuration1 SVF 1.3 Unified Management 50 2 Free Mobility 3 Service Orchestration 4 Unified Security iPCA 5 Service Deployment Routine Monitoring
  • 16. 4 Unified Security ① Security event collection Collect event logs from network devices, security devices, servers, and terminals. ② Big Data analytics Analyze a huge amount of correlated log information to show security condition of the entire network and detect security risks. ③ Network security evaluation Evaluate security threat severity on the entire network, show the attack topology, and identify top-risky assets and zones to provide information for network security protection. ④ Security correlation and active defense Agile Controller delivers adjusted security policies to related devices in response to security events. For example, the devices can log out users or block traffic from these users. Log collection Security policies take effect ②Big Data analytics ③ Network security evaluation Network Design Service Deployment Routine Monitoring Fault Location
  • 17. 4 Unified Security Experience 1. Network-wide or domain-wide security threat evaluation 2. Focus on TOPN risky assets 3. Drill-down domain-wide threat status, view security detail information and handling suggestions Network Design Service Deployment Routine Monitoring Fault Location
  • 18. Lifecycle  Agility Features Network Design Fault Location 1 SVF 1.1 Plug-and-Play 1 SVF 1.2 Centralized Configuration 50 2 Free Mobility 3 Service Orchestration 4 Unified Security iPCA 5 Service Deployment Routine Monitoring
  • 19. 5 iPCA Network Management eSight Agile Switch Operators leased network Shenzhen Headquarters Beijing Branch  Mark 1. Device/Link 3. WAN Egress 2. End to End  Stat. Network Design Service Deployment Routine Monitoring Fault Location
  • 20. 5 iPCA Experience 1.Device/Link-level measurement 2. End-to-end quick measurement Network Design Service Deployment Routine Monitoring Fault Location 3-1. Create a conservation domain 3-2. Conservation domain measurement

Editor's Notes

  1. Feel
  2. Obtain 5W1H access policies (rights, bandwidth)