Submit Search
Upload
Storage visibility and Optimization. A Story of Ceph
•
Download as PPTX, PDF
•
0 likes
•
859 views
Yathiraj Udupi, Ph.D.
Follow
The slidedeck for the presentation by my team at the Atlanta Openstack Summit 2014.
Read less
Read more
Technology
Education
Report
Share
Report
Share
1 of 17
Download now
Recommended
Embracing the Open Source Model
Embracing the Open Source Model
Cisco DevNet
Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Cisco Canada
Список коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасности
Cisco Russia
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
NetworkCollaborators
Eset smart security 8
Eset smart security 8
IT Tech Post
Kaspersky antivirus serial
Kaspersky antivirus serial
personal
SENSE AND SENSIBILITY: PRACTICAL WAYS TO MAKE YOUR CONTENT IMPACTFUL
SENSE AND SENSIBILITY: PRACTICAL WAYS TO MAKE YOUR CONTENT IMPACTFUL
PluggedIn BD
Creating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
Cisco Canada
Recommended
Embracing the Open Source Model
Embracing the Open Source Model
Cisco DevNet
Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Cisco Canada
Список коротких ссылок на решения Cisco по безопасности
Список коротких ссылок на решения Cisco по безопасности
Cisco Russia
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
NetworkCollaborators
Eset smart security 8
Eset smart security 8
IT Tech Post
Kaspersky antivirus serial
Kaspersky antivirus serial
personal
SENSE AND SENSIBILITY: PRACTICAL WAYS TO MAKE YOUR CONTENT IMPACTFUL
SENSE AND SENSIBILITY: PRACTICAL WAYS TO MAKE YOUR CONTENT IMPACTFUL
PluggedIn BD
Creating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
Cisco Canada
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
Martin Thompson
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Cisco Service Provider Mobility
unSEXY Conf 2013: Ainsley Braun, Tinfoil
unSEXY Conf 2013: Ainsley Braun, Tinfoil
500 Startups
RBAC in Swift
RBAC in Swift
HisashiOsanai
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
Scott Cressman
Feb13 webinar the path to u.s. - japan data transfer compliance - final
Feb13 webinar the path to u.s. - japan data transfer compliance - final
TrustArc
Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)
Christopher Ward
What is this thing called OpenStack
What is this thing called OpenStack
Matthew McKinney
Top10 Biggest Security Threats
Top10 Biggest Security Threats
Kim Jensen
Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront
Sheila Goodman
Tadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
Domen Savič
BGA Eğitim Kataloğu
BGA Eğitim Kataloğu
Asım Önder Kabataş
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
scoopnewsgroup
Babies On Black
Babies On Black
rosswhitaker
Wenzhou baodi safety equipment co, ltd
Wenzhou baodi safety equipment co, ltd
Wenzhou Baodi Safety Equipment Co., Ltd
Scott fantabulous Cisco UCS deck
Scott fantabulous Cisco UCS deck
Scott Hanson
Io t1
Io t1
Vivek Kumar Prasad
Ainsley Braun, unSEXY Presentation
Ainsley Braun, unSEXY Presentation
500 Startups
TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010
Kim Jensen
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
The Leasing Foundation
Optimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack Clouds
Yathiraj Udupi, Ph.D.
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Yathiraj Udupi, Ph.D.
More Related Content
What's hot
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
Martin Thompson
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Cisco Service Provider Mobility
unSEXY Conf 2013: Ainsley Braun, Tinfoil
unSEXY Conf 2013: Ainsley Braun, Tinfoil
500 Startups
RBAC in Swift
RBAC in Swift
HisashiOsanai
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
Scott Cressman
Feb13 webinar the path to u.s. - japan data transfer compliance - final
Feb13 webinar the path to u.s. - japan data transfer compliance - final
TrustArc
Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)
Christopher Ward
What is this thing called OpenStack
What is this thing called OpenStack
Matthew McKinney
Top10 Biggest Security Threats
Top10 Biggest Security Threats
Kim Jensen
Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront
Sheila Goodman
Tadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
Domen Savič
BGA Eğitim Kataloğu
BGA Eğitim Kataloğu
Asım Önder Kabataş
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
scoopnewsgroup
Babies On Black
Babies On Black
rosswhitaker
Wenzhou baodi safety equipment co, ltd
Wenzhou baodi safety equipment co, ltd
Wenzhou Baodi Safety Equipment Co., Ltd
Scott fantabulous Cisco UCS deck
Scott fantabulous Cisco UCS deck
Scott Hanson
Io t1
Io t1
Vivek Kumar Prasad
Ainsley Braun, unSEXY Presentation
Ainsley Braun, unSEXY Presentation
500 Startups
TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010
Kim Jensen
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
The Leasing Foundation
What's hot
(20)
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
unSEXY Conf 2013: Ainsley Braun, Tinfoil
unSEXY Conf 2013: Ainsley Braun, Tinfoil
RBAC in Swift
RBAC in Swift
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
Feb13 webinar the path to u.s. - japan data transfer compliance - final
Feb13 webinar the path to u.s. - japan data transfer compliance - final
Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)
What is this thing called OpenStack
What is this thing called OpenStack
Top10 Biggest Security Threats
Top10 Biggest Security Threats
Pascal Louis-Perez, Wealthfront
Pascal Louis-Perez, Wealthfront
Tadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
BGA Eğitim Kataloğu
BGA Eğitim Kataloğu
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
Babies On Black
Babies On Black
Wenzhou baodi safety equipment co, ltd
Wenzhou baodi safety equipment co, ltd
Scott fantabulous Cisco UCS deck
Scott fantabulous Cisco UCS deck
Io t1
Io t1
Ainsley Braun, unSEXY Presentation
Ainsley Braun, unSEXY Presentation
TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Guy Smith from Cisco Capital at The Leasing Foundation Third Annual Conference.
Viewers also liked
Optimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack Clouds
Yathiraj Udupi, Ph.D.
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Yathiraj Udupi, Ph.D.
Network visibility for efficient Openstack operations
Network visibility for efficient Openstack operations
Yathiraj Udupi, Ph.D.
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Yathiraj Udupi, Ph.D.
Network Monitoring and Analytics
Network Monitoring and Analytics
PLUMgrid
The Top 8 Challenges with Network Monitoring
The Top 8 Challenges with Network Monitoring
HelpSystems
OpenStack Israel 2015 keynote
OpenStack Israel 2015 keynote
Nicolas (Nick) Barcet
Viewers also liked
(7)
Optimized NFV placement in Openstack Clouds
Optimized NFV placement in Openstack Clouds
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Openstack 2016 Barcelona - Adiuvo Bot – Smart DevOps using bots for effectiv...
Network visibility for efficient Openstack operations
Network visibility for efficient Openstack operations
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Predictive analytics and Visualization. Towards Data Driven Insights for Open...
Network Monitoring and Analytics
Network Monitoring and Analytics
The Top 8 Challenges with Network Monitoring
The Top 8 Challenges with Network Monitoring
OpenStack Israel 2015 keynote
OpenStack Israel 2015 keynote
Similar to Storage visibility and Optimization. A Story of Ceph
Storage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph Story
Debojyoti Dutta
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Debojyoti Dutta
Network Visibility For Openstack Operations
Network Visibility For Openstack Operations
Debojyoti Dutta
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Nur Shiqim Chok
Corporate Visions Conference
Corporate Visions Conference
Thierry van Herwijnen
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Corporate Visions
Enterprise Lean-Agile: It’s More Than Scrum
Enterprise Lean-Agile: It’s More Than Scrum
TechWell
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
Rick Huijbregts
Brink sanders cisco architecture keynote
Brink sanders cisco architecture keynote
Nur Shiqim Chok
From Air Gap to Air Control
From Air Gap to Air Control
EnergySec
Internet of everything
Internet of everything
Jayesh Pai
Internet of everything
Internet of everything
Wg Cdr Jayesh C S PAI
Mfg workshop security
Mfg workshop security
Robert Albach
Learn Without Limits in a Connected World
Learn Without Limits in a Connected World
Marc Lijour, OCT, BSc, MBA
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
IABC Houston
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Emily Murphy
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
NetworkCollaborators
Similar to Storage visibility and Optimization. A Story of Ceph
(20)
Storage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph Story
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Predictive Analytics & Visualization - Towards Data Driven Insights for Opens...
Network Visibility For Openstack Operations
Network Visibility For Openstack Operations
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Corporate Visions Conference
Corporate Visions Conference
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Enterprise Lean-Agile: It’s More Than Scrum
Enterprise Lean-Agile: It’s More Than Scrum
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
Brink sanders cisco architecture keynote
Brink sanders cisco architecture keynote
From Air Gap to Air Control
From Air Gap to Air Control
Internet of everything
Internet of everything
Internet of everything
Internet of everything
Mfg workshop security
Mfg workshop security
Learn Without Limits in a Connected World
Learn Without Limits in a Connected World
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Recently uploaded
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Recently uploaded
(20)
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Storage visibility and Optimization. A Story of Ceph
1.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Storage Visibility and Optimization A Story of Ceph
2.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco ConfidentialCisco ConfidentialCisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Cloud/Big-data Winnovation Team Alex Holden ajonasho@cisco.com Damian Van Vuuren dvanvuur@cisco.com Ailing Zhang ailzhang@cisco.com Marc Solanas msolanas@cisco.com Matt Weeks maweeks@cisco.com Pengfei Zhang penfzhan@cisco.com Kai Zhang kazhang2@cisco.com Xinyuan Huang xinyuahu@cisco.com Debo Dutta dedutta@cisco.com Yathiraj Udupi yudupi@cisco.com
3.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Why do we need storage visibility?
4.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential OpenStack Storage Openstack APIs Cinder ???? Swift Glance
5.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential The Storage Jungle
6.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Why is visibility useful? Optimal object distribution Failure detection Make underlying configuration easier Performance tuning
7.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Case Study: Ceph Source: http://ceph.com/docs/master/architecture/
8.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Case Study: Ceph hash(“foo”) % 128 = 0x3f “bar’ = 2
9.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Visibility in Ceph
10.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential The visibility we want in Ceph Visual monitoring Object distribution OSD real time status Visual management of crush rules
11.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential
12.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Ceph Horizon Panel Demo
13.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. Use case: Identify bottlenecks
14.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential
15.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Optimization Rebalance storage nodes dynamically Preview changes (Future work) Change configuration automatically (Future work)
16.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Reduce downtime Increase storage performance Provide analytics and historical data More insights to follow!
17.
© 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Thank you. Please answer our survey online:
Download now