Networked Banking Architecture: Arunshetty Country Manager-Systems Engineering, Commercial Cisco India and Saarc
Networked Banking Architecture: Arunshetty Country Manager-Systems Engineering, Commercial Cisco India and Saarc
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
Agenda
IS R
Business & Technology trends S elf D ef ending N etw ork V irtua l D a ta center Q uestions ?
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
jhford1
FINANCE
R eg ional F inanc e
H e a d q u a rte rs
Cu s t o m e r L o c a tio n s
Se c u r e , R e l i a b l e I n t r a n e t A c c e s s t o C or e A p p s
Voice & Video Applications W eb App O ptim Sales iz ation
S AL ES
T r av eling E mp loy ee
H R
D e p a rtm B r a Ap n c ph l,i cS a m O f f i c Av e , a S i lt a o S c h o T o h l , r o Cl u ig n
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
R e m o te O ffic e s T e l e -w o r k e r s
D at a C ent er Ar c h i t ec t u r e
I P S ec , V P N B u s ines s P art ners
ISP#1 O O nline nline B B ank ank ing ing N N etw etw or or k k R R em em ote ote Access Access N N etw etw or or k k
Mainframe
ISP#2
In t e r n e t
P u b l ic W eb S erv ers
E mp l o y ee T rav el ing
A p p l ic at io ns S erv ers
W o rk ing fro m H o me
C C or or e e N N etw or etw or k k
IP C C
A N PST N ISD N
B r anc h N et w o r k Ar c h i t ec t u r e
In t e r n e t ( ISP)
2 1 3 # 2 4 4 ) '(& 0 % $ # " #
Data Center
Branch N e t w o rk
(W A N
IS D N b ack u p )
IS D N ( W A N b ack u p )
PSTN
(W A N
IS D N b ack u p )
PSTN
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
T o In te r n e t G E
G E
W AN
Ag g r eg ation
7 2 0 0 /7 3 0 0 /7 6 0 0
SO H O / 8 0 0
SO H O
1 8 0 0 /2 8 0 0 /3 8 0 0
W AN
R emote Ac c ess
Converged Voice/Video/Data S ite to s ite VP N S ecu rity A dvanced Q oS H igh A vail ab il ity S ervices F l ex ib il ity I ntegrated G E L A N /Data Center Connectivity I P /M P L S R ou ting M u l ti-p rotocol W A N T raf f ic
B ran c h
P ar tner s
6
M ob i l e , D i a l , D SL , C a b l e
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
C on t e n t D e l i v e r y
Fi r e w a l l , ID S a n d V P N Ap p l i a n c e s Co n t e n t En g i n e H y b r id / K e y S y s te m B r a n c h Ac c e s s R o u t e r L AN S w i t c h
V oi c e Se r v i c e s
D a ta
L oc a l C on n e c t i v i t y
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
T h e C o m p l et e C i s c o S M B C l as s N et w o r k F o u ndat i o n P o r t f o l i o
M ed ium B usiness
M id -mar k et
10
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
N e t w or k I n f r a s t r u c t u r e Pr ot e c t i on
P r otect th e netw or k inf r astr u ctu r e f r om attack s and v u lner ab ilities C ontr ol P lane P olicing B u ilt in VP N H W E ncr y ption
USB USB
T h re a t D e fe n s e
P r ev ent and r espond to netw or k attack s and th r eats su ch as w or m s I ntr u sion P r otection, F ir ew all
S ecu r e Voice
GE GE S F P
H W IC
H W IC
H W IC
H W IC
N M E
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
N M E
C o n fid e n tia l
N M C iEs c o
N M E
Hardware Innovation Raises Voice Leadership C isco S ervices and A ppl ications D el ivered A t W irespeed!
A d v a n c e d V oi c e A p p l i c a t i on s
I n t e g r a t e d M od u l a r i t y
C isco C allM anag er E x pr ess, S u r v iv ab le R em ote S ite T eleph ony , C isco U nity E x pr ess
S cales ser v ice capab ilities and v oice densities N ew ex tension v oice m odu le N ew h ig h speed inter f ace car ds
C or e Pe r f or m a n c e
T h e f ou ndation f or u nm atch ed v oice per f or m ance N ew pr ocessor N ew specializ ed v oice silicon N ew adaptab le inter f aces E m b edded C M E , S R S T , S ecu r ity
USB USB
Em b e d d e d M od u l a r i t y
E nab les em b edded conf er encing , au tom ated attendant and v oice m ail N ew dig ital sig nal pr ocessor slots Adv anced I nteg r ation m odu le slots Voice/ F ax and C onf er encing D S P s
H W IC H W IC H W IC H W IC
GE GE S F P
N M E
C is c o C o n fid e n tia l
N M E N M E
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
N M E
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
13
S ec u r i t y T h r eat s
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
14
S witching
Rou ting
IP T el ephony
W irel ess LA N
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
N etwork ed Hom e
15
S el f -D ef endi ng N et w o r k s
C iscos S ecu rity S trateg y
En a e le m e n o f d e fe e n
Integrated
b lin t to n s e fo rc g e b e a n e m
v e ry a p o in t d p o lic y e n t
P r o a c tiv e te c h n o lo a u to m a tic a th re
A dap ti v e
s e c u r ity g ie s th a t lly p r e v e n t a ts
Co l l a b th e d e v ic th e n e
C o l l ab o rati v e
o r a tio s e r v ic e s th r tw o rk a tta c
n a m o n g e s a n d o u g h o u t to th w a rt k s
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
16
M itig ating T arg eted A ttack s and M al ware S el f -D ef ending N etwork A ppl ied
Cisco Security A g en t ( CSA ) Cisco I SR R outers w ith I P S A SA 5 5 0 0 w ith Con ten t Security Cisco A SA 5 5 0 0 A d a p tiv e Security A p p l ia n ce w ith I P S a n d Cisco I ron P ort Ca ta l yst Serv ice M od ul es I P S4 2 0 0 Series A SA 5 5 0 0 Series Cisco Security A g en t ( CSA ) Cisco Security M a n a g em en t Suite
C S A
I nter net
C S A
D ay Z er o E ndpoint P r otection
S er v er P r otection
B ran c h
C onv er g ed b r anch pr otection L ocal content scanning to m itig ate m alw ar e intr odu ction N etw or k Adm ission C ontr ol to pr ev ent m alw ar e and enf or ce policy R ou ter -b ased I P S to pr otect local clients and pr eser v e b andw idth
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C am p us
E ndpoint pr otection f r om spy w ar e, b otnets, spam , tr oj ans H ig h -capacity inter net-edg e secu r ity I nb ou nd, ou tb ou nd, and intr aL AN pr otection and contr ol C ontent secu r ity and N etw or k Adm ission C ontr ol to m itig ate m alw ar e pr opag ation
C is c o C o n fid e n tia l
H i g h -c a p a c i t y p r ot e c t i on of s e r v e r s a n d a p p l i c a t i on s A p p l i c a t i on a n d p r ot oc ol i n s p e c t i on t o p r ot e c t s e r v e r s a n d s y s te m s L oc a l s e r v e r p r ot e c t i on f r om t a r g e t e d e x p l oi t a t t e m p t s
D ata C en ter
17
N AC N et w o r k Adm i s s i o n C o nt r o l
1 . E nd user attemp ts to ac c ess a W eb
p ag e or uses an op tional c lient
N etw o r k access is b lo ck ed u ntil w ir ed o r w ir eless end u ser p r o vides lo g in inf o r m atio n
T H E G O AL
A u t h e n t i c a t i on Se r v e r C le a n A c c e s s M a n a g e r In tr a n e t/ N e t w or k
2 . U ser is
r ed ir ec ted to a log in p ag e
Clean Access validates u ser nam e and p assw o r d, also p er f o r m s device and netw o r k scans to assess vu lner ab ilities o n th e device
C le a n A c c e s s Se r v e r
Q u a r a n tin e
3 b . D ev ic e is c lean
M ach ine g ets o n cer tif ied devices list and is g r anted access to netw o r k
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
18
K ey F eatures
I ncidents are top olog ically aware f or v isualiz ation an d rep lay
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
19
S ec u r i t y V i s i o n: C o m p r eh ens i v e Ar c h i t ec t u r e Ap p r o ac h
II NN TT EE GG RR AA TT EE DD SS EE CC UU RR II TT YY
I PSe c V PN D D oS M i t i g a t i on A V A g e n t Q u a r a n tin e V L A N ( R e m e d i a t i on ) C is c oT r u s t A g e n t C Se A is c o c u r ity g e n t
AA DD AA PP TT II VV EE T T HR HR E E A A T T DD EE FF EE NN SS EE
F ir e w a In tr u D e te lls a n d s i on c t i on
CC OO LL LL AA BB OO RR AA TT II VV EE SS EE CC UU RR II TT YY (( NN AA CC ))
SSL V PN
En c r y p t e d L A N / W A N C om m u n i c a t i on s
I d e n t i t y -B a s e d N e t w or k i n g
N e t w or k I n f e c t i on C on t a i n m e n t
N e t w or k A d m i s s i on C on t r ol
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
20
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
21
C i s c o U ni f i ed C o m m u ni c at i o ns S o l u t i o n
P r o d u c tiv ity B u s in e s s P ro c e s s B u s in e s s T r a n s fo r m a tio n
C ol l a b or a t i on
E-M a i l
C a le n d a r
A u d i o-C on f e r e n c i n g
W e b A p p l i c a t i on
Security
V id e o C on f e r e n c i n g
T h e In te rn e t G ro w s U p
IP Network
T e l e p h on e Se r v i c e s In s ta n t M e s s a g in g C on t a c t C e n te r
22
V oi c e M e s s a g in g
C is c o C o n fid e n tia l
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
L AN
& W AN
C o nnec t i v i t y
R outer / G atew ay
D h a k a H O
IP WAN
B r anc h R outer / G atew ay
D a ta In f ra s tru c tu re
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
B ran c h
23
U ni f i ed C o m m u ni c at i o ns
C allM anag er
R outer / G atew ay
R e g i on a l O f f i c e
Dhaka H O
IP WAN
B r anc h R outer / G atew ay
B ran c h
24
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
U ni f i ed C o m m u ni c at i o ns C U G
C allM anag er
PST N
Router/ G a tew a y
and P S T N
T r u nk s / Analog L ink s
PSTN
R O
B an g al o r e H O
VO I P / C U G
IP WAN
B r anc h R outer / G atew ay
B ran c h
25
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
C o nt i nu o u s D ev el o p m ent I n E ndp o i nt s
C i s c o U n i f i e d I P Ph on e 7 9 7 0 G / 7 9 7 1 G -G E E x e c u tiv e s C i s c o U n i f i e d I P Ph on e 7 9 6 0 G / 7 9 6 1 G / 7 9 6 1 G -G E C i s c o U n i f i e d I P Ph on e 7 9 8 5 G C is c oU n ifie d V id e o A d v a n ta g e C h a i r m a n s O ffic e
C i s c o I P C om m u n i c a t or C is c oU n ifie d W ir e le s s I P Ph on e 7 9 2 0
C i s c o U n i f i e d I P Ph on e 7 9 4 0 G / 7 9 4 1 G / 7 9 4 1 G -G E
C i s c o U n i f i e d I P Ph on e 7 9 0 5 G /7 9 1 2 G /7 9 1 1 C i s c o U n i f i e d I P Ph on 7 9 0 2 G
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
B ranch
G e
C is c oA T A 1 8 6 /1 8 8 C i s c o V G 2 4 8 A n a l og Ph on e G a t e w a y
26
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
27
K ey I s s u es b ei ng f ac ed i n t h e B r anc h
AP P L ICAT IO N / D AT A ACCES S P ER FO R M ANCE
W AN b and w id th / latenc y limits Ap p lic ation r esp onse time G lob al inf or mation ac c ess
INCR EAS ED
V oI P , oth p lac ing d M or e ap p sec ur ity ,
Ser v er , stor ag e, and b ac k up L imited I T r esour c es Q uality of d ata p r otec tion C omp lianc e to G ov . r eg ulations
er ap p lic ations alr ead y emand s on th e netw or k lic ations ad d s to Q oS, tr oub lesh ooting need s
NET W O R K
D EM AND S
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
28
T h e W AN
Applications are d esig ned f or L AN env ironm ents
H ig h band w id th L ow latency R eliability
I s A B ar r i er T o C o ns o l i dat i o n
R ound T r ip T ime ( R T T ) ~ 0 ms
L A N S w i t ch S e rv e r
C l i e nt
29
R eg ional O f f ic e
IT
C i s co W A A S N AS
D a ta
B ack -u p
B ack -u p
D AS
D AS
IT
IT
IT
B ack -U p
N S AS A N D AS
D a ta
N A S
N AS D AS
C i s co W A A S
B ack -u p
D a ta
R emote O f f ic e
D iCe s t r n i b t r u a t l e i Ce z d e d n S t e a r r a n v l d i e z r Oe s d p a t S n i m t d o i r S z a e t g o d e r a g e
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
30
C i s c o W AAS - Ac c el er at es Ap p l i c at i o ns
C ateg or y
F i l e Sh a r i n g Em a i l W e b a n d C ol l a b or a t i on Sof t w a r e D i s t r i b u t i on
Ap p lic ations
C IF S N F S M i cro s o f t E x chang e L o tu s N o te s I nt e rne t M ai l H T T P W e b D A V F T P M i cro s o f t S hare p o i nt M i cro s o f t S M S A l t i ri s H P R ad i a M i cro s o f t S Q L O racl e , S A P L o tu s N o te s M i cro s L e g at o V e ri t as C o m m o ft N e N e V au N T tw tb lt Back u p o rk e r ack u p G al ax y
2 X
5 X
1 0 X
2 5 X
5 0 X
1 0 0 X +
> 1 0 0 X P eak
1 0 0 X P eak
> 1 0 0 X P eak
En t e r p r i s e A p p l i c a t i on s
B a c k u p A p p l i c a t i on s
D a t a R e p l i c a t i on
E M C S R D E M C IP R N e tA p p S D at a D o m D o u b l e -T V e ri t as V
2-1 0 X Av g
5 0 X P eak
T h e In te rn e t G ro w s U p
* P e rf o rm ance i m p ro v e m e nt v ari e s b as e d o n u s e r w o rk l o ad , co m p re s s i b i l i t y o f d at a, and W A N charact e ri s t i cs and u t i l i z at i o n. A ct u al nu m b e rs are cas e -s p e ci f i c and re s u l t s m ay v ary . C i s co W A A S can e m p l o y o p t i m i z at i o n o n al m o s t any T C P -b as e d ap p l i cat i o n.
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
31
V F ram e D atacenter - V F D C
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
32
K ey D at ac ent er I nf r as t r u c t u r e I s s u es
Rigid mapping of infrastructure to applications D uplication of dev ices prov isioned for peak capacity H eat & P ow er issues due to large numb ers of dev ices S h aring of infrastructure is v ery minimal L imited application scaling
A p p l i c ati o n A
A p p l i c ati o n B
A p p l i c ati o n C
I n f rastruc ture A
I n f rastruc ture B
I n f rastruc ture C
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
33
N etO p s c onnec ts E th er net c ab ling , c onf ig ur es V L AN / P or t C onf ig Sy sAd min r ac k s new ser v er L oad s O / S and Ap p lic ations Stor ag eO p s c onf ig ur es L U N , map s to Ser v er Stor ag eO p s p r ov isions d isk v olume and r esour c es
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
O r c h estr ation is d esig ned to eliminate th ese d elay s and automate th e p r ov isioning of ser v ic es
34
U t i l i t y R es o u r c e P o o l i ng
End to End Infrastructure Visibility
Ser v er s
N etw or k
Stor ag e
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
35
D y nam i c R ep u r p o s i ng
C h ang e resou rces f rom
M o v e re s o u rc e s a ro u n d b a s e d o n d e m a n d
e .g . s e r v e r fr o m O r a c le g r o u p m o v e s to S A P g r o u p b a s e d o n a p p lic a t io n lo a d . T h e s e r v e r is r e -i m a g e d , c o n n e c t e d t o t h e r i g h t n e t w o r k a n d s t o r a g e .
F ailov er of ph y sical serv ers in th e ev ent of a h ard w are ou tag e. T h e ex act sam e O S im ag e b rou g h t u p on anoth er serv er w ith ou t m anu al interv ention
True Lights Out Operation without affecting application availability
A p p l i c ati o n A
A p p l i c ati o n B
Cisco VFrame
S h are D ata C en ter I n f rastruc ture
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l
36
S u m m ar y
S im p le S c a la b le B r a n c h S o lu tio n s S e c u re d E n d to E n d in fr a s tr u c tu r e
S p e e d lin k s
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
37
T h e In te rn e t G ro w s U p
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .
C is c o C o n fid e n tia l
38