SlideShare a Scribd company logo
1 of 1
Download to read offline
2018 Extreme Network of the Future
XYZAccountconnectingPeople,Processes,Data,andThings.
Therealityofdevicecreep(Manage,discoverandsecure)3devicesperusergoingto7.
2018 Wifi Design
Jeff Green
2018
Rev. 1
South
2.4&5GHzSpectrum
Spectrum
802.11ac MU PlatformWallPlate Camera High Temp
AP + PoE Switch (AP3912)
Delivers XYZ Account unique fit...
q Simplifies Installation by Reusing existing
Ethernet.
q BTLE or 802.15.4 and 3 LAN ports in a single
Access Point.
q 1x 802.3af out to power devices.
AP 3912: 3x 1 Gbps ON-Port
authentication of devices.
Wired IOT AP + Camera (AP3916i)
Great utility, use cases include motion
detection, face recognition, people counting
and parking detection.
q 2X2 802.11ac Wave2 - Bye 1 get 2
eliminate need to run separate cable.
q Up to 2-Megapixel 1920x1080 at 30fps
(H.264/MJPEG) Microphone for audio.
q Combine with ADSP WIDs WIPS.
Manual adjustment: 360
Horizontal Rotation, 90
vertical rotation
AP3935i/e (high-density)
This is where, XYZ Account s Flow-based heavy
lifting will be done
q High-density with Flow-based 450 users/AP
11ac W2, 4x4:4; 3xMU-MIMO.
q Four dedicated single-band antenna ports per
band (8 total) delivering no bottlenecks.
q Transparent PoE failover.
Drop Ceiling Bracket
The tough guy -40C to 70C.)
Cellular Coexistence Filter (ACF) - Minimizes
interference from 3G/4G, distributed antenna
and commercial small cell/femtocell systems.
q One Ethernet Client Port for device chaining to
drive connectivity for Outdoor cameras.
q Dual concurrent 2.4GHz and 5GHz 802.11ac
Wave2 , 2×2:2 radios
q Future for Industrial IOT (ISA100,
WirelessHART
802.15.4 Thread
Border Gateway
LocationUse all 8 spatial streams
20 MHz
40 MHz
80 MHz
802.11ac
20Mhz
20Mhz
40Mhz
40Mhz
80Mhz
80Mhz
160Mhz
20Mhz = 75Mbits per channel
The efficient use of the XYZ Account RF
spectrum still relies on a strong client and
requires tradeoffs between competing
needs including:
Performance
Long battery life
Low cost
QAM
16-QAM
64-QAM
256-QAM
AP3965i/e (Large venues or stadiums)
XYZ Account s outdoor heavy lifting
q IP67 / NEMA 6 certified for use in Florida s harsh
weather conditions.
q 3 dedicated antenna ports per band supporting
triple feed and 6 feed antennas.
q Full range of high-performance MIMO antenna
offerings for meshing and backhaul services.
4x4:4 (P90X)Venue
This is where, Extreme delvers XYZ Account
advanced wireless functionality...
q Flow based Wifi for greater performance and
visibility. Role-based grouping of users, devices, and
applications to deliver priority, QoS, and security.
q Fabric Attach mapping SSIDs to VLANs to CIDs at
the Edge.
q Cloud-ready for zero-touch provisioning (private or
public). XYZ account selects the use-case that fits
best (OPEX or CAPEX).
Compute
(POD N)
VM
VM
VM
Compute
(POD 3)
VM
VM
VM
Compute
(POD 2)
VM
VM
VM
Compute
(POD 1)
Leaf
VM
VM
VM
HPC Students Admin
NSX
App
OS
VM VM VM
Extreme + NSX = Network Agility
7
Service
Velocity
Virtual Switching
XYZ Account
Data Center
AP391x Common Platform
4xCore ARM
CPU
5.0
GHz
2.4
GHz
IOT/2.
4
Eth
1Gbps
AP3917
CP
AP3915 (e*)AP3916
CP PT
AP3912
Harsh Temp
3915e/7632e (-20C to +60C)
Extended temperature range for
Florida s HOT environment. AP3915
is derivative product of the
AP3912i. (Uses the Dakota chipset)
q 802.11ac 2x2:2 Wave 2 MU-MIMO
q Integrated BLE/802.15.4
q USB for opt IoT module
SuperSpec SuperSpec
Integration with ExtremeAirDefense - AP39xx as AirDefense Sensors
Integration with ExtremeLocation - Retail analytics through AP39xx devices
8
VLAN 3
10%
VLAN 2
25%
VLAN 1
15%
IDF 1 IDF 2 IDF 3 IDF 4 IDF n
4
Complete Policy Control
One SSID
Router
3
XYZ Account Campus Fabric
OAM
VLANs
OAM
802.1 802.1
ControlPlane
(wOAMbuilt-in)
How the proposed integration works? First We can leverage the power of
existing XYZ Account Palo Alto Policy Enforcement.
q Enable Network Wide Intent- When the address resolution is finished the
radius accounting message is sent to the firewall.
q Ensure XYZ Account Visibility and Compliance – Based on the information
from the XMC the firewall knows the username for the source IP and also
the Access Control Profile. The user group can be assigned based on the
Access Control Profile.
q Ensure User experiences through Speed- Policy is applied in ASIC
hardware = performance of Tbps for acceptable price, with many ports.
Firewall is software = performance of Gbps, lower number of ports, higher
price.
6
Key Integration
Palo Alto Network
Fortinet
FortiSIEM
CheckPoint
IBM Qradar
AlienVault
FireEye
McAfee
• Roles are Business level groupings built to correspond to specific
user types.
• Rules are policies enforced at the port level to decide what
types of traffic XYZ Account wants to allow, deny, rate limit or
prioritize (No complicated scripting).
• Services are containers of similar Rules so XYZ Account can
apply rules in groups rather than as individual components.
Roles
Faculty
Student
Guest
Rules
Allow, deny,
rate limit,
prioritize. Or
contain.
Services
if X + Y,=Z thenaction then place user into a defined
ROLE
RolesRulesServices
IT Admin Employee Guest
Oracle VPNAdmin.
AllowHTTP
AllowHTTPS
AllowIPSec
AllowSAP
RateLimit
AllowPing
AllowTelnet
AllowEmail
AllowTFTP
AllowSNMP
AllowOracle
DenyBlast
4
Security Analytics
Provide Multilayer detection &
Automation
Threat management policies
Geo-location dashboard
Detect & classify unknown traffic
Automated threat mitigation
2
Default Action
Policy Rules
WLAN Service
Non Auth Policy
Auth Policy
Default Topology
RADIUS Server
Timeout Role
Default Action
Contain to VLAN
Policy Rules
Egress List
Default Action
Contain to VLAN
Policy Rules
Egress List
Default Action
Contain to VLAN
Policy Rules
Egress List
Start Troubleshooting at XYZ Account
in the Right Place
5
Data Sources
NetfFow
sFlow+
IPFix
Packet Inspection
External Threat Feeds
Alert from 3rd Party
Security Infra
DHCP, DNS,AD Logs ?
Bring Intelligence to Edge
Threat Intelligent feeds
Onboard DNS name Matching
East to West traffic visibility
Redirect suspicious traffic
Infrastructure
Looks like a next generation Firewall across
your XYZ Account Network.
Initial Breach
Threat
Undetected
Remediation
Threat Landscape
Multi-Staged
Multi-Vector
Persistent Threat Actors
Polymorphic Malware
Security Pivot
Bad Actor
SOC (time to
detect)
IR (Time to Respond)
It is all
about time
Logs or
Events
StackStorm
Decoupling of vendor
and control
Infrastructure
Business model
Ownership
Considerations
Management
Location
Orchestration
9
XYZ Account
Smart Campus Infrastructure
(Great User Experiences, Devices and Things.)
HVAC
Alarms
Access
Control
Video
Surveilence
Scada Water
LED
Lighting
Intercoms
Almost all new construction today is designed around the
concept of a "green" building. It s essential to ask what
additional things in the XYZ Account Campus will benefit
from network connectivity. First and foremost, a smart
building optimizes energy use.
1
LocationingEnvironmental
Security
Kiosks
medical
bracelets
Smart
locks
Presence
detection
Who is who in IOT?
Geofencing
Alert on out-of-
bounds access
LDAP NAC DHCP Radius Captive
Portal
DNS MDM
St. Petersburg College ServicesSt. Petersburg College User Repositories or Corporate Control
NAC
AnalyticsCompliance
Open Control Plane (v Closed)
AirDefense
193 Signatures
Bad
Actor
Control can run anywhere
q Out-of-the-box, sub-second failover for 1000s of
APs & sessions.
q Automatic synchronization of configuration,
sessions, and statistics across HA pairs.
q Intelligent APs, operate independently of the
wireless core (Survivability in the event of WAN
or DC outage).
Compliance Auditing;
PCI, HIPAA, SOX, Federal
WIDS/WIPS
10
Mobility
Authorize
Analyze
Enforce
2 Open Control Plane
Data Plane Control
Security&QoS(L2-L7)
Analytics&Measurements
Policy
Flow Flow Flow Flow Flow Flow
Flow Flow Flow Flow Flow Flow
Packet Processing Flow Processing
Performance Bottleneck – Eliminated!
Sessions iBeacon IPFix
User ExperienceQoS Context
Understands the
complete network
Flow-based
Technology
Awareness with Zero
impact to Wifi
performance,
Data
Control
Control for context
driven mobility
Data
Control
Management
Control
Fabric Attach (Binding VLAN to I-SID) Automates segmentation...
AP negotiates topology mapping with Fabric via LLDP
AP tags traffic VLANs per user Policy/Role
Fabric recognizes tagged and maps to I-SID for forwarding
VLAN & SSID Independent - Mange more with less, identify multiple
devices per port or SSID. This is where, XYZ Account can enforces policies: user,
device, status, location, time Fine-grained rules.
Actions: Allow, Deny, contain, QoS, rate limit, traffic shape, log, and mirror!
7
Workflow
Composer
Need for Speed - Experience Matters, it is Like going from a hub to a switch. Deliver
wireless Mobility equivalent with wired experience.
q Air-to-the-wire and wire-to-the-air - No bottlenecks, we get the WiFi data onto
the wire from the AP better than anyone else. Access Points include upgraded
CPUs, additional memory, additional amplifiers, and purpose built antennas for
more predictable RF coverage.
q IP Multicasting - Contain multicast at APs, but centralize unicast traffic.
Enforcement of security and policy at the access point
q Over-the-air-performance (90K pps) @ AP. {# Tx antennas} x {# Rx antennas} : {#
spatial streams}
Security Assisted Networking – XYZ Account Building Blocks?
Threat Detection and Remediation Automated Workflow
Threat
Intelligence
3rd Party Cloud
Hey Bad Guy.. I
dropped you at
Source
Security
Services
Security
Analytics
Policy, Visibility, Automation
SIEM IDS/IPS
Cyber Malware
NOC
SOC
Comprehensive Security
intelligence at XYZ Account
Network edge
Sensing-as-a-Service
XYZ Account Benefits...
• Participatory (Crowd sensing)
• Reduction of Data
Acquisition (Built-in)
• Collect Data Previously
Unavailable (leverage
Smartphone as Your Sensing
Assistant
93
Operations cost
Software cost
Scarcity has
shifted from code
to operations
I/O I/OPort Port
Punch above
one's weight
Next Generation Secure Automated Edge
Threat Indicators
Lateral Movement
Port Scans & Sweeps
Default Credential Scan
Behavioral Anomaly Detection
IoT Bot
Command & Control
Malicious DNS Request
Security Eco-System
Create a Stronger Security Posture
Edge to Perimeter coverage
NGFW, Endpoint, SIEM
Leverage their current security devices
Security information sharing
Why make your XYZ Account network Extreme ?
• Augmented Security: Maximizes ROI on existing
Security & XYZ Account Investments
• Threat Detection and Remediation closer to source
Featuring 360 degree Security Insights
• Open, multi-vendor and API driven approach to
Ecosystems

More Related Content

What's hot

4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)
Jeff Green
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)
Jeff Green
 
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdfKVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
RikyFitriadi1
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)
Jeff Green
 

What's hot (20)

Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLANFlexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
Mobility is more than BYOD
Mobility is more than BYODMobility is more than BYOD
Mobility is more than BYOD
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)
 
20.) physical (optics copper and power)
20.) physical (optics copper and power)20.) physical (optics copper and power)
20.) physical (optics copper and power)
 
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof Konkowski
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof KonkowskiPLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof Konkowski
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof Konkowski
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)
 
PLNOG16: Usługi w sieciach operatorskich, Marcin Aronowski
PLNOG16: Usługi w sieciach operatorskich, Marcin AronowskiPLNOG16: Usługi w sieciach operatorskich, Marcin Aronowski
PLNOG16: Usługi w sieciach operatorskich, Marcin Aronowski
 
SDN Network virtualization, NFV & MPLS synergies
SDN Network virtualization, NFV & MPLS synergiesSDN Network virtualization, NFV & MPLS synergies
SDN Network virtualization, NFV & MPLS synergies
 
Новый функционал JunOS для маршрутизаторов
Новый функционал JunOS для маршрутизаторовНовый функционал JunOS для маршрутизаторов
Новый функционал JunOS для маршрутизаторов
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aq
 
PLNOG16: IOS XR – 12 lat innowacji, Krzysztof Mazepa
PLNOG16: IOS XR – 12 lat innowacji, Krzysztof MazepaPLNOG16: IOS XR – 12 lat innowacji, Krzysztof Mazepa
PLNOG16: IOS XR – 12 lat innowacji, Krzysztof Mazepa
 
OpenStack MeetUp - OpenContrail Presentation
OpenStack MeetUp - OpenContrail PresentationOpenStack MeetUp - OpenContrail Presentation
OpenStack MeetUp - OpenContrail Presentation
 
Automate programmable fabric in seconds with an open standards based solution
Automate programmable fabric in seconds with an open standards based solutionAutomate programmable fabric in seconds with an open standards based solution
Automate programmable fabric in seconds with an open standards based solution
 
Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors
Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors
Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors
 
6.) switch quick config (fixed summits)
6.) switch quick config (fixed summits)6.) switch quick config (fixed summits)
6.) switch quick config (fixed summits)
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2
 
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdfKVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
 
Cisco Live! :: Deploying SIP Trunks with Cisco Unified Border Element (CUBE/v...
Cisco Live! :: Deploying SIP Trunks with Cisco Unified Border Element (CUBE/v...Cisco Live! :: Deploying SIP Trunks with Cisco Unified Border Element (CUBE/v...
Cisco Live! :: Deploying SIP Trunks with Cisco Unified Border Element (CUBE/v...
 
7.) convergence (w automation)
7.) convergence (w automation)7.) convergence (w automation)
7.) convergence (w automation)
 

Similar to Places in the network (featuring policy)

Manufacturing pov jeff green 2016 v2
Manufacturing pov jeff green 2016 v2Manufacturing pov jeff green 2016 v2
Manufacturing pov jeff green 2016 v2
Jeff Green
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
Jeff Green
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
Jeff Green
 
Services pov jeff green 2016 v2
Services pov jeff green 2016 v2Services pov jeff green 2016 v2
Services pov jeff green 2016 v2
Jeff Green
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 

Similar to Places in the network (featuring policy) (20)

Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2
 
Manufacturing pov jeff green 2016 v2
Manufacturing pov jeff green 2016 v2Manufacturing pov jeff green 2016 v2
Manufacturing pov jeff green 2016 v2
 
Nfd18 anuta-networks
Nfd18 anuta-networksNfd18 anuta-networks
Nfd18 anuta-networks
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Contrail Enabler for agile cloud services
Contrail Enabler for agile cloud servicesContrail Enabler for agile cloud services
Contrail Enabler for agile cloud services
 
ICC icXchange Solution Brochure
ICC icXchange Solution BrochureICC icXchange Solution Brochure
ICC icXchange Solution Brochure
 
Enabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid ChowEnabling SDN for Service Providers by Khay Kid Chow
Enabling SDN for Service Providers by Khay Kid Chow
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining
 
Services pov jeff green 2016 v2
Services pov jeff green 2016 v2Services pov jeff green 2016 v2
Services pov jeff green 2016 v2
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 
Virtual firewall framework
Virtual firewall frameworkVirtual firewall framework
Virtual firewall framework
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Wireless World
Wireless World Wireless World
Wireless World
 

More from Jeff Green

Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
Jeff Green
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)
Jeff Green
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2
Jeff Green
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Jeff Green
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
Jeff Green
 
15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)
Jeff Green
 
9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)
Jeff Green
 

More from Jeff Green (18)

Where is the beef with 6 e
Where is the beef with 6 eWhere is the beef with 6 e
Where is the beef with 6 e
 
Where is the beef
Where is the beefWhere is the beef
Where is the beef
 
6 e security
6 e security6 e security
6 e security
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
Fortinet ngf w extreme policy
Fortinet ngf w extreme policyFortinet ngf w extreme policy
Fortinet ngf w extreme policy
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)
 
9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Places in the network (featuring policy)

  • 1. 2018 Extreme Network of the Future XYZAccountconnectingPeople,Processes,Data,andThings. Therealityofdevicecreep(Manage,discoverandsecure)3devicesperusergoingto7. 2018 Wifi Design Jeff Green 2018 Rev. 1 South 2.4&5GHzSpectrum Spectrum 802.11ac MU PlatformWallPlate Camera High Temp AP + PoE Switch (AP3912) Delivers XYZ Account unique fit... q Simplifies Installation by Reusing existing Ethernet. q BTLE or 802.15.4 and 3 LAN ports in a single Access Point. q 1x 802.3af out to power devices. AP 3912: 3x 1 Gbps ON-Port authentication of devices. Wired IOT AP + Camera (AP3916i) Great utility, use cases include motion detection, face recognition, people counting and parking detection. q 2X2 802.11ac Wave2 - Bye 1 get 2 eliminate need to run separate cable. q Up to 2-Megapixel 1920x1080 at 30fps (H.264/MJPEG) Microphone for audio. q Combine with ADSP WIDs WIPS. Manual adjustment: 360 Horizontal Rotation, 90 vertical rotation AP3935i/e (high-density) This is where, XYZ Account s Flow-based heavy lifting will be done q High-density with Flow-based 450 users/AP 11ac W2, 4x4:4; 3xMU-MIMO. q Four dedicated single-band antenna ports per band (8 total) delivering no bottlenecks. q Transparent PoE failover. Drop Ceiling Bracket The tough guy -40C to 70C.) Cellular Coexistence Filter (ACF) - Minimizes interference from 3G/4G, distributed antenna and commercial small cell/femtocell systems. q One Ethernet Client Port for device chaining to drive connectivity for Outdoor cameras. q Dual concurrent 2.4GHz and 5GHz 802.11ac Wave2 , 2×2:2 radios q Future for Industrial IOT (ISA100, WirelessHART 802.15.4 Thread Border Gateway LocationUse all 8 spatial streams 20 MHz 40 MHz 80 MHz 802.11ac 20Mhz 20Mhz 40Mhz 40Mhz 80Mhz 80Mhz 160Mhz 20Mhz = 75Mbits per channel The efficient use of the XYZ Account RF spectrum still relies on a strong client and requires tradeoffs between competing needs including: Performance Long battery life Low cost QAM 16-QAM 64-QAM 256-QAM AP3965i/e (Large venues or stadiums) XYZ Account s outdoor heavy lifting q IP67 / NEMA 6 certified for use in Florida s harsh weather conditions. q 3 dedicated antenna ports per band supporting triple feed and 6 feed antennas. q Full range of high-performance MIMO antenna offerings for meshing and backhaul services. 4x4:4 (P90X)Venue This is where, Extreme delvers XYZ Account advanced wireless functionality... q Flow based Wifi for greater performance and visibility. Role-based grouping of users, devices, and applications to deliver priority, QoS, and security. q Fabric Attach mapping SSIDs to VLANs to CIDs at the Edge. q Cloud-ready for zero-touch provisioning (private or public). XYZ account selects the use-case that fits best (OPEX or CAPEX). Compute (POD N) VM VM VM Compute (POD 3) VM VM VM Compute (POD 2) VM VM VM Compute (POD 1) Leaf VM VM VM HPC Students Admin NSX App OS VM VM VM Extreme + NSX = Network Agility 7 Service Velocity Virtual Switching XYZ Account Data Center AP391x Common Platform 4xCore ARM CPU 5.0 GHz 2.4 GHz IOT/2. 4 Eth 1Gbps AP3917 CP AP3915 (e*)AP3916 CP PT AP3912 Harsh Temp 3915e/7632e (-20C to +60C) Extended temperature range for Florida s HOT environment. AP3915 is derivative product of the AP3912i. (Uses the Dakota chipset) q 802.11ac 2x2:2 Wave 2 MU-MIMO q Integrated BLE/802.15.4 q USB for opt IoT module SuperSpec SuperSpec Integration with ExtremeAirDefense - AP39xx as AirDefense Sensors Integration with ExtremeLocation - Retail analytics through AP39xx devices 8 VLAN 3 10% VLAN 2 25% VLAN 1 15% IDF 1 IDF 2 IDF 3 IDF 4 IDF n 4 Complete Policy Control One SSID Router 3 XYZ Account Campus Fabric OAM VLANs OAM 802.1 802.1 ControlPlane (wOAMbuilt-in) How the proposed integration works? First We can leverage the power of existing XYZ Account Palo Alto Policy Enforcement. q Enable Network Wide Intent- When the address resolution is finished the radius accounting message is sent to the firewall. q Ensure XYZ Account Visibility and Compliance – Based on the information from the XMC the firewall knows the username for the source IP and also the Access Control Profile. The user group can be assigned based on the Access Control Profile. q Ensure User experiences through Speed- Policy is applied in ASIC hardware = performance of Tbps for acceptable price, with many ports. Firewall is software = performance of Gbps, lower number of ports, higher price. 6 Key Integration Palo Alto Network Fortinet FortiSIEM CheckPoint IBM Qradar AlienVault FireEye McAfee • Roles are Business level groupings built to correspond to specific user types. • Rules are policies enforced at the port level to decide what types of traffic XYZ Account wants to allow, deny, rate limit or prioritize (No complicated scripting). • Services are containers of similar Rules so XYZ Account can apply rules in groups rather than as individual components. Roles Faculty Student Guest Rules Allow, deny, rate limit, prioritize. Or contain. Services if X + Y,=Z thenaction then place user into a defined ROLE RolesRulesServices IT Admin Employee Guest Oracle VPNAdmin. AllowHTTP AllowHTTPS AllowIPSec AllowSAP RateLimit AllowPing AllowTelnet AllowEmail AllowTFTP AllowSNMP AllowOracle DenyBlast 4 Security Analytics Provide Multilayer detection & Automation Threat management policies Geo-location dashboard Detect & classify unknown traffic Automated threat mitigation 2 Default Action Policy Rules WLAN Service Non Auth Policy Auth Policy Default Topology RADIUS Server Timeout Role Default Action Contain to VLAN Policy Rules Egress List Default Action Contain to VLAN Policy Rules Egress List Default Action Contain to VLAN Policy Rules Egress List Start Troubleshooting at XYZ Account in the Right Place 5 Data Sources NetfFow sFlow+ IPFix Packet Inspection External Threat Feeds Alert from 3rd Party Security Infra DHCP, DNS,AD Logs ? Bring Intelligence to Edge Threat Intelligent feeds Onboard DNS name Matching East to West traffic visibility Redirect suspicious traffic Infrastructure Looks like a next generation Firewall across your XYZ Account Network. Initial Breach Threat Undetected Remediation Threat Landscape Multi-Staged Multi-Vector Persistent Threat Actors Polymorphic Malware Security Pivot Bad Actor SOC (time to detect) IR (Time to Respond) It is all about time Logs or Events StackStorm Decoupling of vendor and control Infrastructure Business model Ownership Considerations Management Location Orchestration 9 XYZ Account Smart Campus Infrastructure (Great User Experiences, Devices and Things.) HVAC Alarms Access Control Video Surveilence Scada Water LED Lighting Intercoms Almost all new construction today is designed around the concept of a "green" building. It s essential to ask what additional things in the XYZ Account Campus will benefit from network connectivity. First and foremost, a smart building optimizes energy use. 1 LocationingEnvironmental Security Kiosks medical bracelets Smart locks Presence detection Who is who in IOT? Geofencing Alert on out-of- bounds access LDAP NAC DHCP Radius Captive Portal DNS MDM St. Petersburg College ServicesSt. Petersburg College User Repositories or Corporate Control NAC AnalyticsCompliance Open Control Plane (v Closed) AirDefense 193 Signatures Bad Actor Control can run anywhere q Out-of-the-box, sub-second failover for 1000s of APs & sessions. q Automatic synchronization of configuration, sessions, and statistics across HA pairs. q Intelligent APs, operate independently of the wireless core (Survivability in the event of WAN or DC outage). Compliance Auditing; PCI, HIPAA, SOX, Federal WIDS/WIPS 10 Mobility Authorize Analyze Enforce 2 Open Control Plane Data Plane Control Security&QoS(L2-L7) Analytics&Measurements Policy Flow Flow Flow Flow Flow Flow Flow Flow Flow Flow Flow Flow Packet Processing Flow Processing Performance Bottleneck – Eliminated! Sessions iBeacon IPFix User ExperienceQoS Context Understands the complete network Flow-based Technology Awareness with Zero impact to Wifi performance, Data Control Control for context driven mobility Data Control Management Control Fabric Attach (Binding VLAN to I-SID) Automates segmentation... AP negotiates topology mapping with Fabric via LLDP AP tags traffic VLANs per user Policy/Role Fabric recognizes tagged and maps to I-SID for forwarding VLAN & SSID Independent - Mange more with less, identify multiple devices per port or SSID. This is where, XYZ Account can enforces policies: user, device, status, location, time Fine-grained rules. Actions: Allow, Deny, contain, QoS, rate limit, traffic shape, log, and mirror! 7 Workflow Composer Need for Speed - Experience Matters, it is Like going from a hub to a switch. Deliver wireless Mobility equivalent with wired experience. q Air-to-the-wire and wire-to-the-air - No bottlenecks, we get the WiFi data onto the wire from the AP better than anyone else. Access Points include upgraded CPUs, additional memory, additional amplifiers, and purpose built antennas for more predictable RF coverage. q IP Multicasting - Contain multicast at APs, but centralize unicast traffic. Enforcement of security and policy at the access point q Over-the-air-performance (90K pps) @ AP. {# Tx antennas} x {# Rx antennas} : {# spatial streams} Security Assisted Networking – XYZ Account Building Blocks? Threat Detection and Remediation Automated Workflow Threat Intelligence 3rd Party Cloud Hey Bad Guy.. I dropped you at Source Security Services Security Analytics Policy, Visibility, Automation SIEM IDS/IPS Cyber Malware NOC SOC Comprehensive Security intelligence at XYZ Account Network edge Sensing-as-a-Service XYZ Account Benefits... • Participatory (Crowd sensing) • Reduction of Data Acquisition (Built-in) • Collect Data Previously Unavailable (leverage Smartphone as Your Sensing Assistant 93 Operations cost Software cost Scarcity has shifted from code to operations I/O I/OPort Port Punch above one's weight Next Generation Secure Automated Edge Threat Indicators Lateral Movement Port Scans & Sweeps Default Credential Scan Behavioral Anomaly Detection IoT Bot Command & Control Malicious DNS Request Security Eco-System Create a Stronger Security Posture Edge to Perimeter coverage NGFW, Endpoint, SIEM Leverage their current security devices Security information sharing Why make your XYZ Account network Extreme ? • Augmented Security: Maximizes ROI on existing Security & XYZ Account Investments • Threat Detection and Remediation closer to source Featuring 360 degree Security Insights • Open, multi-vendor and API driven approach to Ecosystems