Upload
netscout
View
158
Download
0
Embed Size (px)
Citation preview
Enterprise Networks: No Tool Left Behind
June 2016
©2016 NETSCOUT
Help your tools manage the network migration beyond 10G
AGENDA HIGHLIGHTS
• Going beyond 10G
• Key requirements
• Real-world solutions to migration headaches
• Architecture planning and takeaways
David VanValkenburgSolutions architecture managerNETSCOUT
SPEAKER:
©2016 NETSCOUT
3
EXPONENTIAL GROWTH AND NEW DATA CENTER DEMANDS 2014 – 2018
©2016 NETSCOUT
EVOLVING NEEDS
©2016 NETSCOUT 4
The need to optimize packet flows
Make service assurance platform
more efficient
Rate of Change: Higher bandwidth
links with older tools
Challenges in scaling monitoring and
visibility
IT workload challengesSLAs
Data Center evolution
Bring existing tools along as your network migrates to higher speeds
©2016 NETSCOUT
6
WHAT IS A PACKET FLOW SWITCH?Network Centralized Tools
Application Performance Management
Network Performance Management
Customer Experience Management
Security
From the Network To the Tools
An Appliance to Optimize Packet Flow
©2016 NETSCOUT
Network Centralized Tools
Application Performance Management
Network Performance Management
Customer Experience Management
Security
SPEED CONVERSION: Extend the life of the tools
100G 10G
Speed ConversionPFS
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
Network Centralized Tools
Application Performance Management
Network Performance Management
Customer Experience Management
Security
FILTERING: Reduce the amount of extraneous traffic
FilterPFS
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
Network Centralized Tools
Application Performance Management
Network Performance Management
Customer Experience Management
Security
SLICING: Strip unnecessary payload
SlicingPFS
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
Network Centralized Tools
Application Performance Management
Network Performance Management
Customer Experience Management
Security
STRIPPING: Enable processing of encapsulated packets
StrippingPFS
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
Network Centralized Tools
Application Performance Management
Network Performance Management
Customer Experience Management
Security
LOAD BALANCING: Share the burden
Load BalancePFS
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
Network Centralized Tools
Application Performance Management
Network Performance Management
Customer Experience Management
Security
DEDUPLICATION: Streamline packet flows
De-Duplication
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
PFS
De-Duplication
PFS ENABLES OPTIMIZED PACKET FLOW
to help tools see more and work better
Security
NGFW
IDS
IPS
Network Centralized ToolsPFS
Case studies
©2016 NETSCOUT
15
CASE STUDY: Multiple datacenters Full visibility with distributed
packet flow switches and TAPs
10G and 100G traffic is aggregated, speed converted and load balanced across multiple 1G/10G tools
Complete traffic feed to external customers/users
Site 1:
Site 2:
6 x 100G 8-32 x 10G
60 x 10G 8-32 x 1G
10G tools
1G tools
Packet flow switch
Packet flow switch Packet flow switch©2016 NETSCOUT
16
CASE STUDY: Enterprise Service Assurance
InfiniStream for UC
Servers
PFS 3903
Switches
PFS Manager
InfiniStream for NPM
PFS 3901
PFS 3901 PFS
3901
PFS 3903
Expand visibility for NPM and new Unified Communications across multiple sites Centralized packet flow
management and control—from anywhere
Highly resilient and scalable for growth
nGeniusONE integration for improved port identification and reporting
©2016 NETSCOUT
17
ARCHITECTURE PLANNING
• Not just a “one-tool”-based project
• Balance current and future needs
• Determine scope and key requirements
©2016 NETSCOUT
UNIFIED PACKET PLANE
NO NETWORK TOOL LEFT BEHIND!
• Retain investment in existing tools
• Simplify adds, tests and changes
• Support both performance assurance and cyber security
Additional Resources
NE TSCOUT. COM
• Listen to the live webinar here• How To Select A Security Visibility Solution