Copyright © 2014 Juniper Networks, Inc. 1
Leveraging Networks and Automation across the Enterprise
Mohini Singh DukesJuniper Networks
Copyright © 2014 Juniper Networks, Inc. 2
Setting the context
Technology—Path to Success
Achieving your Goals
Copyright © 2014 Juniper Networks, Inc. 3
Setting the context
Copyright © 2014 Juniper Networks, Inc. 4
Desired OutcomesPriorities
Strategic Initiatives
IT Organization Capacity and Alignment Enhance Experience
Collaborate with wider IT Community Reduce costs
Government as Digital Business transformation Increase Agility
Deliver Operational Excellence Reduce Risk
The Network is key to success
Copyright © 2014 Juniper Networks, Inc. 5
Networks need to be …
Simple Easy to use, manage and improve experience
Secure
Efficient
Adaptively protect based on changing needs
Scale with cost efficiency
Copyright © 2014 Juniper Networks, Inc. 6
How do you get there?
Dual Personality – Service Provider & Enterprise
Technologies – Automation, SDN/NFV, Virtualization
Cloud adoption
Integrated Security
Copyright © 2014 Juniper Networks, Inc. 7
The Cloud is EverywhereA huge opportunity, if you seize it
7
Everything is moving to the cloud
Network virtualization and automation transforming IT
Make IT an advantage
Application delivery across dispersed sites is critical
Evolve Now.
Copyright © 2014 Juniper Networks, Inc. 8
Paths to the CloudMake sure your network can get you there
TIME
TCO
Automation
Virtualization – SDN/NFV
Orchestration
IT Data Center
Elastic, Fully Automated, and On-Demand
Evolutionary: choice and investment protection
Integrated Security
Copyright © 2014 Juniper Networks, Inc. 9
Technology—Path to Success
Copyright © 2014 Juniper Networks, Inc. 10
Network Automation
Copyright © 2014 Juniper Networks, Inc. 11
Automation versus Orchestration
Eliminates repeatable manual tasks through scripts or other software
tools
Extension of automation -groups automated tasks into coordinated workflows.
Task = “Crushing Grapes” Workflow = “Making Wine”
Automation Orchestration
Speed up “IT” workflows at scale while eliminating errors
Copyright © 2014 Juniper Networks, Inc. 12
One size does not fit all
ManualTools 10’s of devices No automation –
Command Line
MSDC – More than 10K Devices - Just need APIs with a Open OS
Cloud automationtools
10000’s of devicesComplete automation –Orchestration and Cloud Management tools
DevOPstools 1000’s of devices Partial automation -
Scripting
Small Enterprise
Medium Enterprise
Large Enterprise
Copyright © 2014 Juniper Networks, Inc. 13
Classification of Automation Tools
Build
ConfigureAudit
Zero Touch Provisioning (ZTP)
Chef, Puppet, AnsibleSNMP, NetConf, PyEz
Step towards DevOps/ NetOps capabilities
Copyright © 2014 Juniper Networks, Inc. 14
Day 0 provisioning
Day to day provisioning
Capacity planning and visibility
1
2
3
• Staging• Configuration building• Rollout and Management
Configurations & Troubleshooting• Ports, VLANs, Routing• Policies, QoS, ACLs
• Overall network visibility• Monitor network utilization• Plan for future growth
Lifecycle Automation
Copyright © 2014 Juniper Networks, Inc. 15
Example: Migrate ports as part of Network UpgradeService Provider
Migrate 26,000+ services from legacy to new, modern routers Tedious, error-prone process with limited access to router devices
Challenge
Solution Automate complex, tedious tasks - eliminate errors, reduce timeCustomized GUI based tool – migrate multiple ports at a time
Migration completed ahead of the schedule$1.5M Overall savings on project
Result
Copyright © 2014 Juniper Networks, Inc. 16
Example: Rapid DeploymentEnterprise
Deploy network devices across 2000+ stores within aggressive scheduleTraditional methods - error prone and time consumingIntegrate with existing MS-SQL Database with standardized configuration
Challenge
Solution Tool to automate provisioning of network devicesSimple, reliable and scalable custom web based solution
Accelerated and accurate provisioning of multiple network devices simultaneously.Installation Error rates < 40% with $$ savings annually
Result
Copyright © 2014 Juniper Networks, Inc. 17
Automation requires a Cultural shiftI am not a "Programmer"
I think about the network &complex networking planning
I spend a lot of my time fire-fighting the network
I need automation tools to help me do my job
I know I need to "level-up" with automation but I need something that helps me get started
Operations TeamEngineering TeamArchitect Team
System ArchitectsDay 0 to 365
Strategy ArchitectsDay 365 +
Solution Engineers
VendorCertification team
Network monitoring Team
Troubleshooting Engineers
Copyright © 2014 Juniper Networks, Inc. 18
Software Defined Networking (SDN)/ Network Function Virtualization (NFV)
Copyright © 2014 Juniper Networks, Inc. 19
Begin with Virtualization
Overlay tunnels on physical underlay
Support multi-tenant environment
Extend elasticity from compute to network
Reliable, scalable, well performing underlay
Bridge virtual and physical
Copyright © 2014 Juniper Networks, Inc. 20
Understanding the distinctions
SDN Network Virtualization Manage
Deploy
Design Network
Services
NFV
Multiple virtual overlay networks over common physical underlayCentralized network view
Decouple network functions from proprietary hardware appliances to run in
software
Copyright © 2014 Juniper Networks, Inc. 21
What is SDN?
SDN=OpenFlow
SDN=Centralized Control Plane
SDN=Standard Southbound API
SDN=Apps talking to Controllers
Copyright © 2014 Juniper Networks, Inc. 22
Centralized management of distributed network
SDN Concepts
Decouples control and data planes
Network programmability
Copyright © 2014 Juniper Networks, Inc. 23
SDN Implementation Drivers and BarriersSDN to show significant growth by 2016
87% of medium and large N. American enterprises intend to have SDN live in data center by 2016
Top Drivers:• Improving management capabilities
• Improving application performance
Top Concerns:• Potential network interruptions
• Interoperability with existing network equipment
Vendor Focus:• Educate enterprises on SDN’s role in cloud
• Work with enterprise customers to provide demos of success
Copyright © 2014 Juniper Networks, Inc. 24
Pick the option that suits you bestThree categories are forming
• Off-the-shelf• Value simplicity• Extending existing environment with limited customization
Commercial Buyers
The Network Must Be Adaptable
• Forward looking & innovative• Value ability to customize• Open source clouds for emerging applications
Open Source
• Highly skilled, dedicated• Self reliant, highly adept• Customized solutions and scripts for specialized problems
Do It Yourself
Copyright © 2014 Juniper Networks, Inc. 25
Underlay
Overlay
Applications Virtual and Physical Workloads
Analytics+
Visibility
Analytics across the Overlay & Underlay networks
HR MARKETINGFINANCE
Orchestration Layer
Copyright © 2014 Juniper Networks, Inc. 26
NFV Concepts
Service Chaining
Service Provider environments
Decouple network functions from hardware
Copyright © 2014 Juniper Networks, Inc. 27
Security
Copyright © 2014 Juniper Networks, Inc. 28
Market Situation
Hackers are popping up everywhere
Security incident every 7 minutes
Cost increasing per security incident
Data breaches – 6 successful per day
Source: Verizon 2015 Data Breach Investigation Report.
$
Copyright © 2014 Juniper Networks, Inc. 29
Security ArchitectureComprehensive, Pervasive, and Dynamic Security Reduces Time to Protect
High Performance Security
Central ManagementPolicy, App Visibility, Threat Map, Events
Virtual FirewallPhysical Firewall
Advanced Threat Intelligence & Prevention in
Cloud
Application Security ServicesAppSecure, IPS, AV, Web Filtering, AS
Network Infrastructure
C&C, GeoIP feed, other threat intelligence
Private, Public, Hybrid Cloud Security
Virtual Firewall
Copyright © 2014 Juniper Networks, Inc. 30
Cloud
Copyright © 2014 Juniper Networks, Inc. 31
Data Center (B)
Data Center (A)
Agency/ Branch
App
App
App
OS OS
Cloud Provider
OS OS
OS
OS OS
OS
WAN Router
✓ QoS
Access Control
Firewall policies
VPN connections
✓✓
✓
✓
MPLSVPN
Internet
Tenant B
Tenant A
Tenant C
Extend the Network into the CloudSecure and Control the Cloud Experience
AppApp
App
App App
App
App
App
…
Data Center Fabric
Virtual Security
Virtual Security
Copyright © 2014 Juniper Networks, Inc. 32
Achieving your Goals
Copyright © 2014 Juniper Networks, Inc. 33
Path to Success: Best PracticesEstablish a solid network foundation
Enable seamless connectivity for application & service delivery
Virtualize to the extent that makes sense, build shortest bridges between virtual and physical
Optimize network performance and user experience
Adopt an integrated, multi-level approach to security
Copyright © 2014 Juniper Networks, Inc. 34
Increasing Security
Segment the network
Secure based on user privileges
Implement cyber-literacy training
Manage software and hardware
Copyright © 2014 Juniper Networks, Inc. 35
Leveraging the Cloud
Services - Elastic, on-demand, anywhere/ anytime
Innovation Agility - Scale, port and share across locations
Cost Benefits - Derive improved value faster with less
Copyright © 2014 Juniper Networks, Inc. 36
Recommendations
Scalability
Operational Simplicity
Lock-‐in free Interoperability
Copyright © 2014 Juniper Networks, Inc. 37
Priorities
Translating initiatives into value
IT Organization Capacity and Alignment
Collaborate with wider IT Community
Government as Digital Business transformation
Deliver Operational Excellence
Your Value
Create digitally exciting workplace, Attract best talent
Create Web scale IT - accelerate time to services, Break Silos
Multichannel citizen engagement
Increase Infrastructure ROI, Showcase service innovation
Thank You