cloud providers’ data center checklistdata center checklist start with connectivity, the...

1
Copyright 2019 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respecve owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publicaon without noce. PN: 9040139-001-EN Corporate and Sales Headquarters Juniper Networks, Inc. 1133 Innovaon Way Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or +1.408.745.2000 Fax: +1.408.745.2100 www.juniper.net APAC and EMEA Headquarters Juniper Networks Internaonal B.V. Boeing Avenue 240 1119 PZ Schiphol-Rijk Amsterdam, The Netherlands Phone: +31.0.207.125.700 Fax: +31.0.207.125.701 Cloud Providers’ Data Center Checklist Start with connecvity, the foundaon of the cloud, and define your data center fabric before building out your cloud environment. This could be controller-less, using automaon pracces together with the fabric, or controller-based, where the soluon runs end-to-end connecvity and security. The decision depends on what automaon, orchestraon and cloud plaorm suits your customer’s needs. For control-based fabrics, you may consider a physical switching layer alongside physical and virtual appliances. Define your data center fabric 1 Providers will have different profiles and goals to meet their client’s needs, which will vary with the cloud type they need to support; private, public, virtualized, hyper-converged or containerized. Workloads could be bare metal, virtualized or containerized. Deployments could be scratch-built greenfield environments, but most will be brownfield with varying legacy infrastructures so it’s key to find a soluon that allows customers to define their ideal strategy and best soluon for their journey. Choose a cloud soluon 2 The same tools used to automate connecvity are also used to extend workloads to cloud environments. You can automate connecvity to support applicaons with underlay networking to provision physical elements or by automang the overlay network with soſtware defined and overlay networking techniques. This builds dynamic, private connecons between workloads that you can extend out securely to your customer’s public cloud plaorm (or plaorms). Automate connecvity and extend 3 There are many security and management tools to fully secure workloads across a cloud system. By consolidang them within a single user interface, you can fully manage and automate the enre network environment. These tools cover orchestraon, hardware and virtual roung operang systems, firewall plaorms, threat prevenon, switches and routers. A complete, interconnected porolio offers a simplified, secure and automated way to uncomplicate the cloud. Layer in and coordinate security 4 Watch the Webinar

Upload: others

Post on 13-Mar-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Copyright 2019 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

PN: 9040139-001-EN

Corporate and Sales HeadquartersJuniper Networks, Inc.1133 Innovation WaySunnyvale, CA 94089 USAPhone: 888.JUNIPER (888.586.4737)or +1.408.745.2000Fax: +1.408.745.2100www.juniper.net

APAC and EMEA HeadquartersJuniper Networks International B.V.Boeing Avenue 2401119 PZ Schiphol-RijkAmsterdam, The NetherlandsPhone: +31.0.207.125.700Fax: +31.0.207.125.701

Cloud Providers’ Data Center Checklist

Start with connectivity, the foundation of the cloud, and define your data center fabric before building out your cloud environment. This could be controller-less, using

automation practices together with the fabric, or controller-based, where the solution runs

end-to-end connectivity and security.

The decision depends on what automation, orchestration and cloud platform suits your customer’s needs.

For control-based fabrics, you may consider a physical switching layer alongside physical and virtual appliances.

Define your data center fabric

1

Providers will have different profiles and goals to meet their client’s needs, which will vary with the cloud

type they need to support; private, public, virtualized, hyper-converged or containerized. Workloads could

be bare metal, virtualized or containerized.

Deployments could be scratch-built greenfield environments, but most will be brownfield with varying legacy infrastructures so it’s key to find a solution that

allows customers to define their ideal strategy and best solution for their journey.

Choose a cloud solution

2

The same tools used to automate connectivity are also used to extend workloads to cloud environments.

You can automate connectivity to support applications with underlay networking to provision physical elements

or by automating the overlay network with software defined and overlay networking techniques.

This builds dynamic, private connections between workloads that you can extend out securely to your

customer’s public cloud platform (or platforms).

Automate connectivity and extend

3

There are many security and management tools to fully secure workloads across a cloud system. By consolidating them within a single user interface, you can fully manage

and automate the entire network environment.

These tools cover orchestration, hardware and virtual routing operating systems, firewall platforms, threat prevention, switches and routers. A complete, interconnected portfolio offers a simplified, secure

and automated way to uncomplicate the cloud.

Layer in and coordinate security

4

Watch the Webinar