byasardell06-09-201702:34 PM - edited 06-10-201708:56 AM
It’s great to be part of the evolving art of networking, and there’s no better place than NANOG. This week, network operators at NANOG 70 (Bellevue, WA) checked in with us continually for updates on the status of various solutions in our data center portfolio. I’ll talk about these and other questions in this post.
First, the key themes addressed in the sessions and in the hallways were:
Security (DDoS): In the aftermath of the Wanna Cry worldwide cyberattack, savvy customers were keen to discuss best practices for keeping data center networks secure
Automation and Control: Consultations around automation continued to gain momentum in both the session presentations and in the many meetings we held with operators
Evolution of NANOG
NANOG over the years has evolved with the changing shape of the Internet. In its original charter and earliest meetings starting in 1994, it was dedicated exclusively to network service providers and the regular exchange of technical information to keep the Internet in sound shape.
Figure 1: NANOG Continues to Thrive with a Growing Audience (Source: NANOG)
Visibility and Analytics: Relevance to Applications
Compared to the early days of NANOG, measurement and telemetry that once was only required at limited scale is now geared to the cloud, and requires collection and analysis at higher volume and at multiple layers.
Accordingly, there were sessions on network telemetry from Princeton University and from Yahoo. And many other sessions talked about:
A key presentation in the general session was on DDoS trends and a call for action from longtime security architect Merike Kaeo. One of her key recommendations for best practices was to band together as a community and share attack information as long as it doesn’t impact privacy.
Thus, “attack use cases” such as SSH brute force attacks and DNS amplification attacks, as well as attempts at SPAM phishing, can be circulated among operators in order to quickly close the door on the damage before it becomes unwelcome national news. This viewpoint resonated with the audience.
Even given all the exciting research in automation, architects and engineers from many service providers (even the most forward-looking) noted that they are still in the early days of going beyond the command line: mapping their configurations to rules and handcrafting the result into policies.
And the latter is very welcome news, because we received a lot of queries and excitement about the 100G and 25G density of the SLX 9540, and also about the recently available virtual SLX, which will be very useful for design and training purposes for our customers.
In the end, customers were very glad to see the completeness of the portfolio (Figure 3) that is moving to Extreme.
Figure 3: Switching, Routing and Analytics Portfolio
These offerings meld nicely into a pure play, end-to-end IP networking portfolio.
Call to Action
Contact your Brocade representative for information, demonstrations or evaluation copies: