SlideShare a Scribd company logo
© 2015 VMware Inc. All rights reserved.
People, processes, technology
Network Virtualization Best Practise
Emil Gągała
Network & Security Architect
InfraXstructure, 20.04.2016, Warszawa
Network Virtualization change areas
2
TechnologyPeople
Process
Best practices and guidance based on
production customers
The maturity model: the path to the vision
3
Blended
Cross-domain
and discipline
Siloed Specialization
Organization
(Structure)
People
(Roles &
Responsibilities)
People
Automated Modern
Manual Legacy
Processes Tooling
Process
Minimum
Maximum
Minimum
MaximumLeaf-spine fabric Virtual
3-tier Physical
Architecture Infrastructure
Architecture
Simplifying the situation
4
Technology
Process
People
Myth busters!
5
People
You will not be
automated out of a job.
MYTH #1
Software-defined data
center is going to automate
me out of a job
MYTH #2
Network functions will be
absorbed into the
virtualization team
MYTH #3
A virtual overlay is going to
make my job more difficult
MYTH
BUSTER #1
Your job will not go to
the virtualization team.
MYTH
BUSTER #2
Overlays do not make
your job more difficult.
MYTH
BUSTER #3
Private cloud | SDDC
Traditional network | HDDC
Hybrid cloud | SDDC
Org structures (simplified view)
6
Successfully operationalized in a variety of org structures
Compute Storage Networking
People
Minimum
Maximum
OperationsEngineeringArchitecture
Minimum
Maximum
• Blended
• Autonomous
• Intra-team training
Compute Storage Networking
Best practices
CONFIDENTIAL 7
Start with a small, cross-functional team
Select change agents
Define measures
of success
Communicate lessons
and wins
People
1
Network
SecurityCompute
Storage
Incubation team Tiger team
High impact
8
Unified team working together, sharing lessons learned, and continuously improving
People
Silos Specialization
Blended
Cross-domain
and discipline
A closely-knit team working in unison increases
company speed and agility
Team gains new expertise and experience, making
them more strategic and valuable to the company
Leadership opportunity during this networking
and security transformation
Avoid surprises!
New Cloud networking and security roles
Org structure People
9
Network virtualization is based on networking
concepts that require networking expertise
Need network engineers to deploy and
operate it
Career growth and opportunity
Network engineers must learn network
virtualization to stay current
Learning network virtualization is
required for future career growth
People
Simplifying the situation
10
TechnologyPeople
Process
& Tooling
Myth busters!
11
Process
& Tooling
Virtual networks bring
agility and simplicity
to processes.
MYTH #1
Virtual networks adds
complexity to existing
processes
MYTH #2
You need separate tools to
manage virtual and
physical networks
MYTH #3
Network virtualization
reduces visibility
MYTH
BUSTER #1
Existing management
tools can monitor both
networks.
MYTH
BUSTER #2
Provides more context
and visibility.
MYTH
BUSTER #3
Best practices
CONFIDENTIAL 12
Inventory and analyze existing processes
Process
2
Inventory Benchmark Measure
CONFIDENTIAL 13
Start
COTS?
Create
Network Data
flow diagram
Asset Discovery
vCenter
(Tags, notes)
Define List of
IP s & VM s
End
VMware
Infrastructure
Navigator
Existing Firewalls NetFflow Collectors
Existing
Documentation
Existing Asset and
Discovery
Monitoring
Dashboards
Potential Data Sources
Define
Grouping
Objects
Documentation
Security Groups
Vendor
Documentation
Services / Service
Groups
IPSETs
List of IP AddressesList of VM s
Define Security
Posture
Security Policies
Manual Firewall
Rules
Deploy
Performance /
Capacity
management
reports
Best practices
CONFIDENTIAL 14
Automate provisioning and management
Process
3
Start with IT automation
Quick win: security
automation
Self-service: portals and
catalogs
Security Policies & Groups
Development workload
Test workload
Production workload
Application type:
customer PCI
Groups
Finance
Sales
Engineering
Standards
Config #1
Config #2
Config #3
Config #4
Config #5
Config #6
Tooling considerations
Process
& Tooling
Application
Dashboard
Best practices
CONFIDENTIAL 16
Create application-level visibility
Process
4
Start with existing tools
Use same instrumentation
and protocols
Using blend of tools is OKHealth
Utilization
Capacity
COMPUTE NETWORK STORAGE
Real-time
summary
Monitoring and
troubleshooting
Debugging
High impact
17
Automated processes and enhanced network management
Automated Modern
Manual Legacy
Process
& Tooling
Policy-based provisioning of networks and services
brings agility and eliminates common config. errors
Manual operations can be automated (e.g., self service
portals, scaling network services, rule management)
Single view providing highest level of visibility into virtual
and physical SDDC infrastructureProcesses Tooling
Simplifying the situation
18
People
Process
Technology
A tightly integrated
system from a single
vendor is not always
best.
Technology
MYTH #1
A tightly integrated system
from a single vendor is the
best approach.
MYTH #2
Network virtualization
requires a re-architecture
of the physical network.
MYTH #3
Overlay networks are
inherently difficult to
manage.
Myth busters!
MYTH
BUSTER #1
Network Virtualization
works on your existing
physical network.
MYTH
BUSTER #2
Overlay networks have
been proven to be flexible
and easy to manage.
MYTH
BUSTER #3
Define your initial use cases
20
Micro segmentation
DMZ anywhere
Secure end user
Security
IT automating IT
Multi-tenant
infrastructure
Developer cloud
IT automation
Disaster recovery
Metro pooling
Hybrid cloud
networking
Application continuity IT optimization
Server asset utilization
Price | performance
Hardware lifecycle
$
Best practices
CONFIDENTIAL 21
Implement network virtualization incrementally5
Focus on service quality
Collaborate with
stakeholders
Develop SLAs over time
Design the physical
network for simplicity
Technology
Use case #1
Micro-segmentation
Communicate
• Project wins
• Learnings
• KPI metrics
Best practices
CONFIDENTIAL 22
Design the network for simplicity and resiliency6
Technology
Add networking and
security to DR
Workload mobility
and portability
Throughput, scalability,
and robustness
Traditional VLAN network
VM1 VM2
Server 1
VM3
VM4 VM5
Server 2
VM6
VM7 VM8
Server 3
VM9
Physical switch
Virtual networks:
1 2
3
VLANs
Technology
Software Defined Data Center
VM1 VM2
Server 1
VM3
VM4 VM5
Server 2
VM6
VM7 VM8
Server 3
VM9
Controller
Technology
High impact
Decouple and abstract networking services for increased control
Leaf-spine
ECMP fabric Virtual
Access/aggregation
/core
Physical
Resilient and scalable leaf-spine architecture
increases reliability and performance
Centralized point of control for management
and monitoring of virtual networks and security
Distributed implementation of services means
fine-grained policies can be operationalized
Technology
Architecture Infrastructure
Next steps
26
Minimum
Maximum
Minimum
Maximum
Blended
Cross-domain
and discipline
Silos Specialization
People
Automated Modern
Manual Legacy
Process
Leaf-spine
ECMP fabric
Virtual
Access/Aggregation
/Core
Physical
Architecture
TransformationPilotLearning
Organization
(structure)
People
(roles and
responsibilities)
Processes Tooling Architecture Infrastructure
Things to remember
27
Operations transformation results in big outcomes and rewards
Leadership: set vision,
communicate, and
involve people
Grow: gain expertise
and achieve professional
and career growth
Incremental: start with
one use case and set of
applications
Many have done it. It’s not complicated. Minimal changes.
Thank You

More Related Content

PDF
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMware
 
PDF
New Solutions for Security and Compliance in the Cloud
Online Tech
 
PPTX
VMworld 2016 Recap
Kevin Groat
 
PDF
Case Study: EVO SDDC Powered Private Cloud
VMware
 
PPTX
Private cloud day session 5 a solution for private cloud security
Microsoft TechNet - Belgium and Luxembourg
 
PPTX
Let's talk CLOUD!
Santiago (Santi) Cuellar
 
PDF
VMware NSX @ VMUG.IT 20150529
VMUG IT
 
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Jürgen Ambrosi
 
VMWare on VMWare - How VMware IT Implemented Micro-Segmentation and Deployed ...
VMware
 
New Solutions for Security and Compliance in the Cloud
Online Tech
 
VMworld 2016 Recap
Kevin Groat
 
Case Study: EVO SDDC Powered Private Cloud
VMware
 
Private cloud day session 5 a solution for private cloud security
Microsoft TechNet - Belgium and Luxembourg
 
Let's talk CLOUD!
Santiago (Santi) Cuellar
 
VMware NSX @ VMUG.IT 20150529
VMUG IT
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Jürgen Ambrosi
 

What's hot (20)

PDF
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
ColloqueRISQ
 
PDF
Introduction to Microservices Architecture - SECCOMP 2020
Rodrigo Antonialli
 
PPT
Why Security Teams should care about VMware
JJDiGeronimo
 
PDF
NSX on VMware Data Center
Angel Villar Garea
 
PDF
Purpose-Built-SSL-VPN White Paper
Array Networks
 
PDF
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
Netwrix Corporation
 
PDF
Security and Virtualization in the Data Center
Cisco Canada
 
PDF
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld
 
PDF
What You Need To Know About The New PCI Cloud Guidelines
CloudPassage
 
PPT
S102 cics the future is closer abridged
nick_garrod
 
PPTX
Data Center Security Now and into the Future
Cisco Security
 
PPSX
Síťová virtualizace s VMware
MarketingArrowECS_CZ
 
PPTX
Network Virtualization
InterVision Systems
 
PDF
NATS in action - A Real time Microservices Architecture handled by NATS
Raül Pérez
 
PPTX
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Jaroslav Prodelal
 
PPTX
Increasing Business Value Through High-Availability Technology
Nexenta Systems
 
PDF
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
Andris Soroka
 
PPT
Update on vDesk 3.0
Doug Dooley
 
PPTX
Is Your Data Secure
Real-Time Innovations (RTI)
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
ColloqueRISQ
 
Introduction to Microservices Architecture - SECCOMP 2020
Rodrigo Antonialli
 
Why Security Teams should care about VMware
JJDiGeronimo
 
NSX on VMware Data Center
Angel Villar Garea
 
Purpose-Built-SSL-VPN White Paper
Array Networks
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
Netwrix Corporation
 
Security and Virtualization in the Data Center
Cisco Canada
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld
 
What You Need To Know About The New PCI Cloud Guidelines
CloudPassage
 
S102 cics the future is closer abridged
nick_garrod
 
Data Center Security Now and into the Future
Cisco Security
 
Síťová virtualizace s VMware
MarketingArrowECS_CZ
 
Network Virtualization
InterVision Systems
 
NATS in action - A Real time Microservices Architecture handled by NATS
Raül Pérez
 
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Jaroslav Prodelal
 
Increasing Business Value Through High-Availability Technology
Nexenta Systems
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
Andris Soroka
 
Update on vDesk 3.0
Doug Dooley
 
Is Your Data Secure
Real-Time Innovations (RTI)
 
Ad

Viewers also liked (16)

PDF
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
PROIDEA
 
PPTX
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
PROIDEA
 
PDF
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
PROIDEA
 
PPSX
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
PROIDEA
 
PDF
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
PROIDEA
 
PDF
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
PROIDEA
 
PDF
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
PROIDEA
 
PDF
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
PROIDEA
 
PDF
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
PROIDEA
 
PDF
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
PROIDEA
 
PDF
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
PROIDEA
 
PDF
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
PROIDEA
 
PPTX
infraxstructure: Marcin Kaczmarek "SDS - Storage jako aplikacja."
PROIDEA
 
PDF
infraxstructure: Jarosław Zieliński i Sławomir Stanek "Wojna o Wirtualizację...
PROIDEA
 
PPTX
infraxstructure: Rafał Stańczak "Postępujący rozwój infrastruktury na potrze...
PROIDEA
 
PDF
infraxstructure: Piotr Wojciechowski "Secure Data Center"
PROIDEA
 
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
PROIDEA
 
infraxstructure: Mariusz Rybusiński, Veeam "Keep Calm and Backup to the Cloud"
PROIDEA
 
infraXstructure Alexis Dacquay, "How to win back visibility into your network...
PROIDEA
 
infraxstructure: Krzysztof Szczygieł "Infrastruktura i wyposażenie Data Cent...
PROIDEA
 
infraxstructure: Robert Mroczkowski "Maszyny się uczą - admińskie rozmówki p...
PROIDEA
 
infraxstructure: Robert Zdunek, "Jak zbudować innowacyjne i efektywne energet...
PROIDEA
 
infraxstructure: Krzysztof Waszkiewicz "Usługi chmurowe dla biznesu wolne od...
PROIDEA
 
infraxstructure: Mateusz Chrobok "Opowieść o ucieczce przed błędami typu 0da...
PROIDEA
 
InfraXstructure: Mirosław Dąbrowski "Zmiany w organizacji a gotowość na meto...
PROIDEA
 
infraxstructure: Mirosław Burnejko "Cloud Migration Checklist – Czyli jakie ...
PROIDEA
 
infraxstructure: Piotr Jabłoński "SDN w praktyce. Znacząca poprawa bezpieczeń...
PROIDEA
 
infraXstructure: Adam Sznajder, Optymalizacja kosztów w Amazon Web Services -...
PROIDEA
 
infraxstructure: Marcin Kaczmarek "SDS - Storage jako aplikacja."
PROIDEA
 
infraxstructure: Jarosław Zieliński i Sławomir Stanek "Wojna o Wirtualizację...
PROIDEA
 
infraxstructure: Rafał Stańczak "Postępujący rozwój infrastruktury na potrze...
PROIDEA
 
infraxstructure: Piotr Wojciechowski "Secure Data Center"
PROIDEA
 
Ad

Similar to infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja sieci to rewolucja w firmie?" (20)

PDF
Sdn primer pdf
Pooja Patel
 
PDF
The Role of Network Virtualization in Achieving True Network Agility
vCloudTech
 
PPTX
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Codit
 
PDF
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET Journal
 
DOC
Mris network architecture proposal r1
Craig Burma
 
PPTX
Lisa Guess - Embracing the Cloud
centralohioissa
 
PDF
Cisco DNA
Mohammad ali Safvati
 
PPTX
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
FINOS
 
PPTX
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Codit
 
PDF
Cloud Security: Perception Vs. Reality
Internap
 
PDF
En35793797
IJERA Editor
 
PDF
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
OpenStack Korea Community
 
PDF
COM526_Lecture 1.pdf
SherefHesham
 
PDF
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
PDF
Network Softwarization
Ahmad Tajuddin Samsudin
 
PDF
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
PDF
VMworld 2014: Virtualization 101
VMworld
 
PPTX
Rik Ferguson
CloudExpoEurope
 
PDF
Week2
trayyoo
 
PPTX
How Cloud Computing will change how you and your team will run IT
Peter HJ van Eijk
 
Sdn primer pdf
Pooja Patel
 
The Role of Network Virtualization in Achieving True Network Agility
vCloudTech
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Codit
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET Journal
 
Mris network architecture proposal r1
Craig Burma
 
Lisa Guess - Embracing the Cloud
centralohioissa
 
OSSF 2018 - Peter Crocker of Cumulus Networks - TCO and technical advantages ...
FINOS
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Codit
 
Cloud Security: Perception Vs. Reality
Internap
 
En35793797
IJERA Editor
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
OpenStack Korea Community
 
COM526_Lecture 1.pdf
SherefHesham
 
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
Network Softwarization
Ahmad Tajuddin Samsudin
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
VMworld 2014: Virtualization 101
VMworld
 
Rik Ferguson
CloudExpoEurope
 
Week2
trayyoo
 
How Cloud Computing will change how you and your team will run IT
Peter HJ van Eijk
 

Recently uploaded (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Architecture of the Future (09152021)
EdwardMeyman
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
Software Development Company | KodekX
KodekX
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Architecture of the Future (09152021)
EdwardMeyman
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 

infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja sieci to rewolucja w firmie?"

  • 1. © 2015 VMware Inc. All rights reserved. People, processes, technology Network Virtualization Best Practise Emil Gągała Network & Security Architect InfraXstructure, 20.04.2016, Warszawa
  • 2. Network Virtualization change areas 2 TechnologyPeople Process Best practices and guidance based on production customers
  • 3. The maturity model: the path to the vision 3 Blended Cross-domain and discipline Siloed Specialization Organization (Structure) People (Roles & Responsibilities) People Automated Modern Manual Legacy Processes Tooling Process Minimum Maximum Minimum MaximumLeaf-spine fabric Virtual 3-tier Physical Architecture Infrastructure Architecture
  • 5. Myth busters! 5 People You will not be automated out of a job. MYTH #1 Software-defined data center is going to automate me out of a job MYTH #2 Network functions will be absorbed into the virtualization team MYTH #3 A virtual overlay is going to make my job more difficult MYTH BUSTER #1 Your job will not go to the virtualization team. MYTH BUSTER #2 Overlays do not make your job more difficult. MYTH BUSTER #3
  • 6. Private cloud | SDDC Traditional network | HDDC Hybrid cloud | SDDC Org structures (simplified view) 6 Successfully operationalized in a variety of org structures Compute Storage Networking People Minimum Maximum OperationsEngineeringArchitecture Minimum Maximum • Blended • Autonomous • Intra-team training Compute Storage Networking
  • 7. Best practices CONFIDENTIAL 7 Start with a small, cross-functional team Select change agents Define measures of success Communicate lessons and wins People 1 Network SecurityCompute Storage Incubation team Tiger team
  • 8. High impact 8 Unified team working together, sharing lessons learned, and continuously improving People Silos Specialization Blended Cross-domain and discipline A closely-knit team working in unison increases company speed and agility Team gains new expertise and experience, making them more strategic and valuable to the company Leadership opportunity during this networking and security transformation Avoid surprises! New Cloud networking and security roles Org structure People
  • 9. 9 Network virtualization is based on networking concepts that require networking expertise Need network engineers to deploy and operate it Career growth and opportunity Network engineers must learn network virtualization to stay current Learning network virtualization is required for future career growth People
  • 11. Myth busters! 11 Process & Tooling Virtual networks bring agility and simplicity to processes. MYTH #1 Virtual networks adds complexity to existing processes MYTH #2 You need separate tools to manage virtual and physical networks MYTH #3 Network virtualization reduces visibility MYTH BUSTER #1 Existing management tools can monitor both networks. MYTH BUSTER #2 Provides more context and visibility. MYTH BUSTER #3
  • 12. Best practices CONFIDENTIAL 12 Inventory and analyze existing processes Process 2 Inventory Benchmark Measure
  • 13. CONFIDENTIAL 13 Start COTS? Create Network Data flow diagram Asset Discovery vCenter (Tags, notes) Define List of IP s & VM s End VMware Infrastructure Navigator Existing Firewalls NetFflow Collectors Existing Documentation Existing Asset and Discovery Monitoring Dashboards Potential Data Sources Define Grouping Objects Documentation Security Groups Vendor Documentation Services / Service Groups IPSETs List of IP AddressesList of VM s Define Security Posture Security Policies Manual Firewall Rules Deploy Performance / Capacity management reports
  • 14. Best practices CONFIDENTIAL 14 Automate provisioning and management Process 3 Start with IT automation Quick win: security automation Self-service: portals and catalogs Security Policies & Groups Development workload Test workload Production workload Application type: customer PCI Groups Finance Sales Engineering Standards Config #1 Config #2 Config #3 Config #4 Config #5 Config #6
  • 16. Application Dashboard Best practices CONFIDENTIAL 16 Create application-level visibility Process 4 Start with existing tools Use same instrumentation and protocols Using blend of tools is OKHealth Utilization Capacity COMPUTE NETWORK STORAGE Real-time summary Monitoring and troubleshooting Debugging
  • 17. High impact 17 Automated processes and enhanced network management Automated Modern Manual Legacy Process & Tooling Policy-based provisioning of networks and services brings agility and eliminates common config. errors Manual operations can be automated (e.g., self service portals, scaling network services, rule management) Single view providing highest level of visibility into virtual and physical SDDC infrastructureProcesses Tooling
  • 19. A tightly integrated system from a single vendor is not always best. Technology MYTH #1 A tightly integrated system from a single vendor is the best approach. MYTH #2 Network virtualization requires a re-architecture of the physical network. MYTH #3 Overlay networks are inherently difficult to manage. Myth busters! MYTH BUSTER #1 Network Virtualization works on your existing physical network. MYTH BUSTER #2 Overlay networks have been proven to be flexible and easy to manage. MYTH BUSTER #3
  • 20. Define your initial use cases 20 Micro segmentation DMZ anywhere Secure end user Security IT automating IT Multi-tenant infrastructure Developer cloud IT automation Disaster recovery Metro pooling Hybrid cloud networking Application continuity IT optimization Server asset utilization Price | performance Hardware lifecycle $
  • 21. Best practices CONFIDENTIAL 21 Implement network virtualization incrementally5 Focus on service quality Collaborate with stakeholders Develop SLAs over time Design the physical network for simplicity Technology Use case #1 Micro-segmentation Communicate • Project wins • Learnings • KPI metrics
  • 22. Best practices CONFIDENTIAL 22 Design the network for simplicity and resiliency6 Technology Add networking and security to DR Workload mobility and portability Throughput, scalability, and robustness
  • 23. Traditional VLAN network VM1 VM2 Server 1 VM3 VM4 VM5 Server 2 VM6 VM7 VM8 Server 3 VM9 Physical switch Virtual networks: 1 2 3 VLANs Technology
  • 24. Software Defined Data Center VM1 VM2 Server 1 VM3 VM4 VM5 Server 2 VM6 VM7 VM8 Server 3 VM9 Controller Technology
  • 25. High impact Decouple and abstract networking services for increased control Leaf-spine ECMP fabric Virtual Access/aggregation /core Physical Resilient and scalable leaf-spine architecture increases reliability and performance Centralized point of control for management and monitoring of virtual networks and security Distributed implementation of services means fine-grained policies can be operationalized Technology Architecture Infrastructure
  • 26. Next steps 26 Minimum Maximum Minimum Maximum Blended Cross-domain and discipline Silos Specialization People Automated Modern Manual Legacy Process Leaf-spine ECMP fabric Virtual Access/Aggregation /Core Physical Architecture TransformationPilotLearning Organization (structure) People (roles and responsibilities) Processes Tooling Architecture Infrastructure
  • 27. Things to remember 27 Operations transformation results in big outcomes and rewards Leadership: set vision, communicate, and involve people Grow: gain expertise and achieve professional and career growth Incremental: start with one use case and set of applications Many have done it. It’s not complicated. Minimal changes.