100% found this document useful (1 vote)
130 views39 pages

Networked Banking Architecture: Arunshetty Country Manager-Systems Engineering, Commercial Cisco India and Saarc

e bank networking
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
130 views39 pages

Networked Banking Architecture: Arunshetty Country Manager-Systems Engineering, Commercial Cisco India and Saarc

e bank networking
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Networked Banking A rc h itec tu re

Arun S h e t t y C o unt ry M a na g e r- S y s t e m s E ng i ne e ri ng , C o m m e rc i a l C i s c o I nd i a a nd S AAR C

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

Agenda
IS R

Business & Technology trends S elf D ef ending N etw ork V irtua l D a ta center Q uestions ?

( I ntegra ted S erv ices R outer )

A p p lica tion N etw ork ing

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

jhford1

B u s i nes s es R eq u i r e an E m p o w er ed E nv i r o nm ent f o r E v er y o ne, E v er y w h er e


C R M SF A E R P M R P Sales Automation

FINANCE
R eg ional F inanc e

H e a d q u a rte rs

Cu s t o m e r L o c a tio n s

Se c u r e , R e l i a b l e I n t r a n e t A c c e s s t o C or e A p p s
Voice & Video Applications W eb App O ptim Sales iz ation

M anuf ac tur ing P lant

M ANU FACT U R ING

S AL ES

R PoS e a c K h i os e dk s M o s tly b y W e b / Ex t r a n e t e n ta l t i ao l n l s br el e , h i c o u t CU S T O M ER P a rtn e rs


3

T r av eling E mp loy ee

H R

D e p a rtm B r a Ap n c ph l,i cS a m O f f i c Av e , a S i lt a o S c h o T o h l , r o Cl u ig n

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

R e m o te O ffic e s T e l e -w o r k e r s

Slide 3 jhford1 Cogs Julie Ford-Hagen (jhford), 8/27/2003

D at a C ent er Ar c h i t ec t u r e
I P S ec , V P N B u s ines s P art ners

ISP#1 O O nline nline B B ank ank ing ing N N etw etw or or k k R R em em ote ote Access Access N N etw etw or or k k
Mainframe

ISP#2

In t e r n e t

P u b l ic W eb S erv ers

E mp l o y ee T rav el ing

A p p l ic at io ns S erv ers

W o rk ing fro m H o me

C C or or e e N N etw or etw or k k

IP C C

I nt ernal W eb S erv ers D at ab as e S erv ers

A N PST N ISD N

B B r r anch anch N N etw etw or or k k


T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

B r anc h N et w o r k Ar c h i t ec t u r e
    

In t e r n e t ( ISP)

 

  

2 1 3 # 2 4 4 ) '(& 0 % $ # " #

Core Banking O t h er Banking A p p l ic at ion

Data Center

Branch N e t w o rk

R R eg eg ional ional B B r r anch anch

(W A N

IS D N b ack u p )

R R eg eg ional ional B B r r anch anch

IS D N ( W A N b ack u p )

PSTN

(W A N

IS D N b ack u p )

R R em em ote ote B B r r anch anch

R R em em ote ote B B r r anch anch

R R em em ote ote B B r r anch anch

R R em em ote ote B B r r anch anch

PSTN
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

E nt er p r i s e-w i de I nt egr at ed S er v i c es f r o m H eadq u ar t er t o t h e B r anc h


Headquarters
Si

T o In te r n e t G E

Integrated services delivery acro ss th e W A N


D a ta C e n te r

G E

W AN

Ag g r eg ation

7 2 0 0 /7 3 0 0 /7 6 0 0

SO H O / 8 0 0

SO H O

1 8 0 0 /2 8 0 0 /3 8 0 0

W AN
R emote Ac c ess

Converged Voice/Video/Data S ite to s ite VP N S ecu rity A dvanced Q oS H igh A vail ab il ity S ervices F l ex ib il ity I ntegrated G E L A N /Data Center Connectivity I P /M P L S R ou ting M u l ti-p rotocol W A N T raf f ic

B ran c h
P ar tner s
6

M ob i l e , D i a l , D SL , C a b l e
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

Integrated Services Router

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

T r adi t i o nal B u s i nes s S o l u t i o n: S ep ar at e Ap p l i c at i o ns and Ap p l i anc es


Se c u r i t y

C on t e n t D e l i v e r y

Fi r e w a l l , ID S a n d V P N Ap p l i a n c e s Co n t e n t En g i n e H y b r id / K e y S y s te m B r a n c h Ac c e s s R o u t e r L AN S w i t c h

V oi c e Se r v i c e s

D a ta

L oc a l C on n e c t i v i t y

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

I nt egr at ed S o l u t i o n f o r Adv anc ed S er v i c es

Integrated Services R o u ter


E mb ed d ed Sec ur ity V oic e R ead y V id eo I nteg r ation L ow D ensity L 2 Sw itc h ing N etw or k Analy sis
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

T h e C o m p l et e C i s c o S M B C l as s N et w o r k F o u ndat i o n P o r t f o l i o

C isc o 3 8 0 0 Services and Density

C isc o 2 8 0 0 C isc o 1 8 0 0 C isc o 8 0 0 T elew or k er / SO H O Small B usiness


C is c o C o n fid e n tia l

M ed ium B usiness

M id -mar k et
10

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

Hardware Innovation Raises Security L eadersh ip


T r u s t & Id e n tity
L ev er ag e th e netw or k to intellig ently pr otect endpoints N etw or k Adm ission C ontr ol, 8 0 2. 1 x

Cisco Self-d efen d in g N et w or k s D eliv er ed A t W ir e-sp eed !


Complete, Preventative, Scalable Security Solutions
Se c u r e C on n e c t i v i t y
S ecu r e and scalab le netw or k connectiv ity VP N , D M VP N , V3 P N , S ecu r e Voice

N e t w or k I n f r a s t r u c t u r e Pr ot e c t i on
P r otect th e netw or k inf r astr u ctu r e f r om attack s and v u lner ab ilities C ontr ol P lane P olicing B u ilt in VP N H W E ncr y ption
USB USB

T h re a t D e fe n s e
P r ev ent and r espond to netw or k attack s and th r eats su ch as w or m s I ntr u sion P r otection, F ir ew all

S ecu r e Voice
GE GE S F P

H W IC

H W IC

H W IC

H W IC

N M E
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

N M E
C o n fid e n tia l

N M C iEs c o

N M E

H ig h P er f or m ance AI M S ecu r ity & Voice S er v ices


11

Hardware Innovation Raises Voice Leadership C isco S ervices and A ppl ications D el ivered A t W irespeed!
A d v a n c e d V oi c e A p p l i c a t i on s

A f f ord able, Secure, Scalable V oice Solutions

I n t e g r a t e d M od u l a r i t y

L ev er ag es m odu lar ity f or integ r ation of v oice applications

C isco C allM anag er E x pr ess, S u r v iv ab le R em ote S ite T eleph ony , C isco U nity E x pr ess

S cales ser v ice capab ilities and v oice densities N ew ex tension v oice m odu le N ew h ig h speed inter f ace car ds

C or e Pe r f or m a n c e
T h e f ou ndation f or u nm atch ed v oice per f or m ance N ew pr ocessor N ew specializ ed v oice silicon N ew adaptab le inter f aces E m b edded C M E , S R S T , S ecu r ity
USB USB

Em b e d d e d M od u l a r i t y
E nab les em b edded conf er encing , au tom ated attendant and v oice m ail N ew dig ital sig nal pr ocessor slots Adv anced I nteg r ation m odu le slots Voice/ F ax and C onf er encing D S P s
H W IC H W IC H W IC H W IC
GE GE S F P

E x tension Voice M odu les


T h e In te rn e t G ro w s U p

N M E
C is c o C o n fid e n tia l

N M E N M E

Au to Attendant, Voicem ail, AI M


12

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

N M E

Sel f D ef ending N etw ork s

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

13

S ec u r i t y T h r eat s

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

14

S ecu rity Is N ow a B asel ine A rchitectu re f or IT Inf rastru ctu re

S witching

Rou ting

IP T el ephony

W irel ess LA N
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

S torag e N etwork ing


C is c o C o n fid e n tia l

N etwork ed Hom e
15

S el f -D ef endi ng N et w o r k s
C iscos S ecu rity S trateg y

En a e le m e n o f d e fe e n

Integrated
b lin t to n s e fo rc g e b e a n e m

v e ry a p o in t d p o lic y e n t

P r o a c tiv e te c h n o lo a u to m a tic a th re

A dap ti v e

s e c u r ity g ie s th a t lly p r e v e n t a ts

Co l l a b th e d e v ic th e n e

C o l l ab o rati v e
o r a tio s e r v ic e s th r tw o rk a tta c

n a m o n g e s a n d o u g h o u t to th w a rt k s

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

16

M itig ating T arg eted A ttack s and M al ware S el f -D ef ending N etwork A ppl ied
Cisco Security A g en t ( CSA ) Cisco I SR R outers w ith I P S A SA 5 5 0 0 w ith Con ten t Security Cisco A SA 5 5 0 0 A d a p tiv e Security A p p l ia n ce w ith I P S a n d Cisco I ron P ort Ca ta l yst Serv ice M od ul es I P S4 2 0 0 Series A SA 5 5 0 0 Series Cisco Security A g en t ( CSA ) Cisco Security M a n a g em en t Suite

C S A

I nter net

I ntr anet I nteg r ated D ata C enter P r otection

C S A

D ay Z er o E ndpoint P r otection

B r anch P r otection C onv er g ed P er im eter P r otection

S er v er P r otection

M onitor ing , C or r elation, and R esponse

P olicy -b ased S olu tion M anag em ent

B ran c h
C onv er g ed b r anch pr otection L ocal content scanning to m itig ate m alw ar e intr odu ction N etw or k Adm ission C ontr ol to pr ev ent m alw ar e and enf or ce policy R ou ter -b ased I P S to pr otect local clients and pr eser v e b andw idth
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C am p us
E ndpoint pr otection f r om spy w ar e, b otnets, spam , tr oj ans H ig h -capacity inter net-edg e secu r ity I nb ou nd, ou tb ou nd, and intr aL AN pr otection and contr ol C ontent secu r ity and N etw or k Adm ission C ontr ol to m itig ate m alw ar e pr opag ation
C is c o C o n fid e n tia l

H i g h -c a p a c i t y p r ot e c t i on of s e r v e r s a n d a p p l i c a t i on s A p p l i c a t i on a n d p r ot oc ol i n s p e c t i on t o p r ot e c t s e r v e r s a n d s y s te m s L oc a l s e r v e r p r ot e c t i on f r om t a r g e t e d e x p l oi t a t t e m p t s

D ata C en ter

17

N AC N et w o r k Adm i s s i o n C o nt r o l
1 . E nd user attemp ts to ac c ess a W eb
p ag e or uses an op tional c lient
N etw o r k access is b lo ck ed u ntil w ir ed o r w ir eless end u ser p r o vides lo g in inf o r m atio n

T H E G O AL

A u t h e n t i c a t i on Se r v e r C le a n A c c e s s M a n a g e r In tr a n e t/ N e t w or k

2 . U ser is

r ed ir ec ted to a log in p ag e

Clean Access validates u ser nam e and p assw o r d, also p er f o r m s device and netw o r k scans to assess vu lner ab ilities o n th e device

C le a n A c c e s s Se r v e r

3 a . D ev ic e is nonc omp liant


or log in is inc or r ec t
U ser is denied access and assig ned to a q u ar antine r o le w ith access to o nline r em ediatio n r eso u r ces
C is c o C o n fid e n tia l

Q u a r a n tin e

3 b . D ev ic e is c lean

M ach ine g ets o n cer tif ied devices list and is g r anted access to netw o r k

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

18

C isco S ecu rity M A RS M onitoring , A nal y sis and Response S y stem


Command and control of your existing inv estment to b uild p erv asiv e security
NIDS, Firewalls, Routers, Switches, CSA Sy slog , SNM P , RDE P , SDE E , NetFlow, E n d p oin t ev en t log s, M ulti-V en d or

Correlate data from across th e E nterp rise

R ap idly locate and mitigate attack s

K ey F eatures

M itig ation on L 2 p orts an d L 3 chok ep oin ts

I ncidents are top olog ically aware f or v isualiz ation an d rep lay

Determ in es security incidents b ased on d ev ice m essa g es, ev ents, an d sessio ns

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

19

S ec u r i t y V i s i o n: C o m p r eh ens i v e Ar c h i t ec t u r e Ap p r o ac h
II NN TT EE GG RR AA TT EE DD SS EE CC UU RR II TT YY
I PSe c V PN D D oS M i t i g a t i on A V A g e n t Q u a r a n tin e V L A N ( R e m e d i a t i on ) C is c oT r u s t A g e n t C Se A is c o c u r ity g e n t

AA DD AA PP TT II VV EE T T HR HR E E A A T T DD EE FF EE NN SS EE
F ir e w a In tr u D e te lls a n d s i on c t i on

CC OO LL LL AA BB OO RR AA TT II VV EE SS EE CC UU RR II TT YY (( NN AA CC ))

SSL V PN

En c r y p t e d L A N / W A N C om m u n i c a t i on s

I d e n t i t y -B a s e d N e t w or k i n g

N e t w or k I n f e c t i on C on t a i n m e n t

N e t w or k A d m i s s i on C on t r ol

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

20

U nif ied C om m unications

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

21

C i s c o U ni f i ed C o m m u ni c at i o ns S o l u t i o n
P r o d u c tiv ity B u s in e s s P ro c e s s B u s in e s s T r a n s fo r m a tio n

C ol l a b or a t i on

E-M a i l

C a le n d a r

A u d i o-C on f e r e n c i n g

W e b A p p l i c a t i on

Security
V id e o C on f e r e n c i n g
T h e In te rn e t G ro w s U p

IP Network
T e l e p h on e Se r v i c e s In s ta n t M e s s a g in g C on t a c t C e n te r
22

V oi c e M e s s a g in g
C is c o C o n fid e n tia l

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

L AN

& W AN

C o nnec t i v i t y

R outer / G atew ay

D h a k a H O

IP WAN
B r anc h R outer / G atew ay

D a ta In f ra s tru c tu re
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

B ran c h
23

U ni f i ed C o m m u ni c at i o ns
C allM anag er

R outer / G atew ay
R e g i on a l O f f i c e

Dhaka H O

IP WAN
B r anc h R outer / G atew ay

B ran c h
24

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

U ni f i ed C o m m u ni c at i o ns C U G
C allM anag er
PST N
Router/ G a tew a y

and P S T N

T r u nk s / Analog L ink s

PSTN
R O

B an g al o r e H O

VO I P / C U G

IP WAN
B r anc h R outer / G atew ay

B ran c h
25

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

C o nt i nu o u s D ev el o p m ent I n E ndp o i nt s
C i s c o U n i f i e d I P Ph on e 7 9 7 0 G / 7 9 7 1 G -G E E x e c u tiv e s C i s c o U n i f i e d I P Ph on e 7 9 6 0 G / 7 9 6 1 G / 7 9 6 1 G -G E C i s c o U n i f i e d I P Ph on e 7 9 8 5 G C is c oU n ifie d V id e o A d v a n ta g e C h a i r m a n s O ffic e

C i s c o I P C om m u n i c a t or C is c oU n ifie d W ir e le s s I P Ph on e 7 9 2 0

C i s c o U n i f i e d I P Ph on e 7 9 4 0 G / 7 9 4 1 G / 7 9 4 1 G -G E

C i s c o U n i f i e d I P Ph on e 7 9 0 5 G /7 9 1 2 G /7 9 1 1 C i s c o U n i f i e d I P Ph on 7 9 0 2 G
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

B ranch

G e

C is c oA T A 1 8 6 /1 8 8 C i s c o V G 2 4 8 A n a l og Ph on e G a t e w a y
26

W A N O p tim iz ation and A p p l ication A ccel eration

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

27

K ey I s s u es b ei ng f ac ed i n t h e B r anc h
AP P L ICAT IO N / D AT A ACCES S P ER FO R M ANCE
W AN b and w id th / latenc y limits Ap p lic ation r esp onse time G lob al inf or mation ac c ess

B R ANCH INFR AS T R U CT U R E CO S T & CO M P L EX IT Y

INCR EAS ED
V oI P , oth p lac ing d M or e ap p sec ur ity ,

Ser v er , stor ag e, and b ac k up L imited I T r esour c es Q uality of d ata p r otec tion C omp lianc e to G ov . r eg ulations

er ap p lic ations alr ead y emand s on th e netw or k lic ations ad d s to Q oS, tr oub lesh ooting need s

NET W O R K

D EM AND S

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

28

T h e W AN
Applications are d esig ned f or L AN env ironm ents
H ig h band w id th L ow latency R eliability

I s A B ar r i er T o C o ns o l i dat i o n
R ound T r ip T ime ( R T T ) ~ 0 ms
L A N S w i t ch S e rv e r

C l i e nt

W AN ch aracteristics h ind er consolid ation


A lread y cong ested L ow band w id th L atency Pack et L oss
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

R ound T r ip T ime ( R T T ) ~ many many millisec ond s


C l i e nt L A N S w i t ch R o u t e d N e t w o rk L A N S w i t ch S e rv e r

29

E nab l ing the S erverl ess B ranch O f f ice


DC c e e l ios s t rt i p b e u r t e B d r a Sen c r vh e O r f M f i od D ai s t t a r i Pr b u ot t e e d c ts i e onr v e R r i s m k od s e l = I$ n 2 f 0 r a 4s t 0 r u K c / ty u r r e C om p l e x i t y t r a t l ri z ole l d e d s e St r v or e r a s g w e i G t h r ow t h UC ne n c on C is c oW A A S= $ 1 0 K /y r H i g h C os t s : $ 2 0 -4 0 K / y r / R B O SA V I N G S p e r B r a n c h O f f i c e = $ 1 0 -3 0 K / y r

Cisco Wide Area Application Engine (WAAS)


B r anc h O f f ic e
IT
C i s co N AS W A A S
D a ta

R eg ional O f f ic e
IT
C i s co W A A S N AS
D a ta

B ack -u p

B ack -u p

D AS

D AS

IT

IT

IT

B ack -U p

N S AS A N D AS
D a ta

N A S

W id e Ar ea N etw or k D ata C enter

N AS D AS

C i s co W A A S

B ack -u p

D a ta

R emote O f f ic e

D iCe s t r n i b t r u a t l e i Ce z d e d n S t e a r r a n v l d i e z r Oe s d p a t S n i m t d o i r S z a e t g o d e r a g e
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

30

C i s c o W AAS - Ac c el er at es Ap p l i c at i o ns
C ateg or y
F i l e Sh a r i n g Em a i l W e b a n d C ol l a b or a t i on Sof t w a r e D i s t r i b u t i on

Ap p lic ations
C IF S N F S M i cro s o f t E x chang e L o tu s N o te s I nt e rne t M ai l H T T P W e b D A V F T P M i cro s o f t S hare p o i nt M i cro s o f t S M S A l t i ri s H P R ad i a M i cro s o f t S Q L O racl e , S A P L o tu s N o te s M i cro s L e g at o V e ri t as C o m m o ft N e N e V au N T tw tb lt Back u p o rk e r ack u p G al ax y

2 X

5 X

1 0 X

2 5 X

5 0 X

1 0 0 X +
> 1 0 0 X P eak

2-20 X Av g 2-5 X Av g 2-1 0 X Av g 20 X P eak

1 0 0 X P eak

2-20 X Av g 2-5 X Av g 2-1 0 X Av g 20 X P eak 5 0 X P eak

> 1 0 0 X P eak

En t e r p r i s e A p p l i c a t i on s

B a c k u p A p p l i c a t i on s

D a t a R e p l i c a t i on

E M C S R D E M C IP R N e tA p p S D at a D o m D o u b l e -T V e ri t as V

F /A e p l i cat o r nap M i rro r ai n ak e o l R e p l i cat o r

2-1 0 X Av g

5 0 X P eak

T h e In te rn e t G ro w s U p

* P e rf o rm ance i m p ro v e m e nt v ari e s b as e d o n u s e r w o rk l o ad , co m p re s s i b i l i t y o f d at a, and W A N charact e ri s t i cs and u t i l i z at i o n. A ct u al nu m b e rs are cas e -s p e ci f i c and re s u l t s m ay v ary . C i s co W A A S can e m p l o y o p t i m i z at i o n o n al m o s t any T C P -b as e d ap p l i cat i o n.
2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

31

V F ram e D atacenter - V F D C

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

32

K ey D at ac ent er I nf r as t r u c t u r e I s s u es
Rigid mapping of infrastructure to applications D uplication of dev ices prov isioned for peak capacity H eat & P ow er issues due to large numb ers of dev ices S h aring of infrastructure is v ery minimal L imited application scaling

A p p l i c ati o n A

A p p l i c ati o n B

A p p l i c ati o n C

I n f rastruc ture A

I n f rastruc ture B

I n f rastruc ture C

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

33

B o x S i l o s R edu c e O p er at i o nal Agi l i t y


N etO p s ensur es B r anc h c onnec tiv ity / R outab le Sub net Sec O p s c h ec k s sec ur ity p olic y , ex p and s F W P or t R ang e SL B Ad min Ad d s Ser v er to P ool Assume y ou j ust w ant to ad d one ser v er to a w eb -f ar m T h e c h alleng e is one of c oor d ination d elay s. T h is ty p e of simp le sc ale-out of an ex isting ser v e of ten tak es enter p r ises 9 0 d ay s. N ew ser v ic e tur n-up s, af ter th e ap p lic ation h as b een d ev elop ed , of ten tak e month s of p lanning

N etO p s c onnec ts E th er net c ab ling , c onf ig ur es V L AN / P or t C onf ig Sy sAd min r ac k s new ser v er L oad s O / S and Ap p lic ations Stor ag eO p s c onf ig ur es L U N , map s to Ser v er Stor ag eO p s p r ov isions d isk v olume and r esour c es
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

O r c h estr ation is d esig ned to eliminate th ese d elay s and automate th e p r ov isioning of ser v ic es

34

U t i l i t y R es o u r c e P o o l i ng
End to End Infrastructure Visibility
Ser v er s

D is c o v e r y o u r p h y s ic a l d a ta c e n te r a s s e ts fr o m o n e p la c e No m o r e p i e c e -m e a l v i e w s o f y o u r D a ta C e n te r in fr a s tr u c tu r e V i e w Se r v e r , St o r a g e a n d Ne t w o r k R e s o u r c e s fr o m a s in g le p a n e A n e n d to m a n u a l c o r e la tio n o f a p p lic a tio n in fr a s tr u c u r e C le a r ly id e n tify w h ic h r e s o u r c e is in u s e fo r w h ic h a p p lic a tio n

N etw or k

Stor ag e

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

35

D y nam i c R ep u r p o s i ng
C h ang e resou rces f rom

M o v e re s o u rc e s a ro u n d b a s e d o n d e m a n d
e .g . s e r v e r fr o m O r a c le g r o u p m o v e s to S A P g r o u p b a s e d o n a p p lic a t io n lo a d . T h e s e r v e r is r e -i m a g e d , c o n n e c t e d t o t h e r i g h t n e t w o r k a n d s t o r a g e .

application g rou p to anoth er on d em and

F ailov er of ph y sical serv ers in th e ev ent of a h ard w are ou tag e. T h e ex act sam e O S im ag e b rou g h t u p on anoth er serv er w ith ou t m anu al interv ention
True Lights Out Operation without affecting application availability

H ig h App D em and S er v er s Added

A p p l i c ati o n A

A p p l i c ati o n B

L ow App D em and S er v er s R etu r ned

Cisco VFrame
S h are D ata C en ter I n f rastruc ture
T h e In te rn e t G ro w s U p 2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l

36

S u m m ar y
S im p le S c a la b le B r a n c h S o lu tio n s S e c u re d E n d to E n d in fr a s tr u c tu r e

C o n v e r g e d V o ic e / V id e o s o lu tio n s A p p lic a tio n A c c e le r a tio n o v e r lo w O p tim iz a tio n o f r e s o u r c e s

S p e e d lin k s

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

37

T h e In te rn e t G ro w s U p

2 0 0 6 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

C is c o C o n fid e n tia l

38

You might also like