14.03.2013 Views

Cisco Open Network Environment (Cisco ONE) and Software Defined Networking (SDN)

Cisco Open Network Environment (Cisco ONE) and Software Defined Networking (SDN)

Cisco Open Network Environment (Cisco ONE) and Software Defined Networking (SDN)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cisco</strong> <strong>Open</strong> <strong>Network</strong> <strong>Environment</strong> (<strong>Cisco</strong> <strong>ONE</strong>)<br />

<strong>and</strong><br />

<strong>Software</strong> <strong>Defined</strong> <strong>Network</strong>ing (<strong>SDN</strong>)<br />

Andy Vallely<br />

Solutions Architect<br />

EMEAR Education Team<br />

DC SEVT Presentation; 13 November 2012<br />

<strong>Cisco</strong> Confidential<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 1


<strong>Cisco</strong> <strong>ONE</strong> Overview<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 2


Expose <strong>Network</strong> Value<br />

Automation, Monitoring, Programmability<br />

Program for<br />

Optimized<br />

Experience<br />

POLICY<br />

Orchestration<br />

<strong>Network</strong><br />

ANALYTICS<br />

Harvest <strong>Network</strong><br />

Intelligence<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 3


Basic Definitions<br />

What Is <strong>Software</strong> <strong>Defined</strong> <strong>Network</strong> (<strong>SDN</strong>)?<br />

“…In the <strong>SDN</strong> architecture, the control <strong>and</strong> data<br />

planes are decoupled, network intelligence <strong>and</strong> state<br />

are logically centralized, <strong>and</strong> the underlying network<br />

infrastructure is abstracted from the applications…”<br />

Note: <strong>SDN</strong> is not m<strong>and</strong>atory for network programmability nor<br />

automation<br />

Source: www.opennetworking.org<br />

What is <strong>Open</strong>Stack?<br />

<strong>Open</strong>source software for building public<br />

<strong>and</strong> private Clouds; includes Compute (Nova),<br />

<strong>Network</strong>ing (Quantum) <strong>and</strong> Storage (Swift)<br />

services.<br />

Note: Applicable to <strong>SDN</strong> <strong>and</strong> non-<strong>SDN</strong> networks<br />

Source: www.openstack.org<br />

What Is <strong>Open</strong>Flow?<br />

<strong>Open</strong> protocol that specifies interactions between<br />

de-coupled control <strong>and</strong> data planes<br />

Note: OF is not m<strong>and</strong>atory for <strong>SDN</strong><br />

Note: North-bound Controller APIs are vendor-specific<br />

What is Overlay <strong>Network</strong>?<br />

Overlay network is created on existing network<br />

infrastructure (physical <strong>and</strong>/or virtual) using a network<br />

protocol. Examples of overlay network protocol are:<br />

GRE, VPLS, OTV, LISP <strong>and</strong> VXLAN<br />

Note: Applicable to <strong>SDN</strong> <strong>and</strong> non-<strong>SDN</strong> networks<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 4


Customer Insights: <strong>Network</strong> Programmability<br />

Research/<br />

Academia<br />

Experimental<br />

<strong>Open</strong>Flow/<strong>SDN</strong><br />

components for<br />

production<br />

networks<br />

<strong>Network</strong><br />

“Slicing”<br />

Massively Scalable<br />

Data Center<br />

Customize with<br />

Programmatic<br />

APIs to provide<br />

deep insight into<br />

network traffic<br />

<strong>Network</strong> Flow<br />

Management<br />

Cloud<br />

Automated<br />

provisioning <strong>and</strong><br />

programmable<br />

overlay,<br />

<strong>Open</strong>Stack<br />

Scalable<br />

Multi-Tenancy<br />

Service Providers<br />

Policy-based<br />

control <strong>and</strong><br />

analytics to<br />

optimize <strong>and</strong><br />

monetize<br />

service delivery<br />

Agile Service<br />

Delivery<br />

Enterprise<br />

Virtual workloads,<br />

VDI, Orchestration<br />

of security profiles<br />

Private Cloud<br />

Automation<br />

Diverse <strong>Network</strong> Programmability Requirements Across Segments:<br />

Automation, Monitoring & Flow Programmability<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 5


<strong>Network</strong> Programmability Models<br />

CLI, SNMP, Netflow, …<br />

Control Plane<br />

Data Plane<br />

1 Programmable APIs<br />

Vendorspecific<br />

APIs<br />

Applications<br />

Control Plane<br />

Data Plane<br />

Vendor<br />

Specific<br />

(e.g. onePK)<br />

2a Classic <strong>SDN</strong><br />

Vendorspecific<br />

APIs<br />

<strong>Open</strong>Flow<br />

Applications<br />

Controller<br />

Data Plane<br />

Vendor<br />

Specific<br />

(e.g. onePK)<br />

2b Hybrid “<strong>SDN</strong>”<br />

Vendorspecific<br />

APIs<br />

<strong>Open</strong>Flow<br />

Applications<br />

Controller<br />

Control Plane<br />

Data Plane<br />

Vendor<br />

Specific<br />

(e.g. onePK)<br />

<strong>Open</strong>stack <strong>and</strong> <strong>Network</strong> Overlays Apply to All Models (Physical/Virtual)<br />

Custom Features Can Be Built<br />

Vendorspecific<br />

APIs<br />

Applications<br />

Virtual Control Plane<br />

Virtual Data Plane<br />

Overlay<br />

Protocols<br />

(e.g. VXLAN)<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 6<br />

3<br />

<strong>Network</strong> Virtualization/<br />

Virtual Overlays<br />

Control Plane<br />

Data Plane


Evolution of the Intelligent <strong>Network</strong><br />

Preserve What’s Working Evolve for Emerging Requirements<br />

• Resiliency<br />

• Scale <strong>and</strong> Security<br />

• Rich feature-set<br />

+<br />

• Operational Simplicity<br />

• Programmability<br />

• Application aware<br />

Evolve the <strong>Network</strong> for the Next Wave of Application Requirements<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 7


<strong>Cisco</strong> <strong>Open</strong> <strong>Network</strong> <strong>Environment</strong><br />

Industry’s Most Comprehensive <strong>Network</strong>ing Portfolio<br />

Hardware + <strong>Software</strong> Physical + Virtual <strong>Network</strong> + Compute<br />

1.<br />

Platform<br />

APIs<br />

<strong>Network</strong><br />

One Platform Kit (onePK)<br />

- Programmatic APIs for <strong>Network</strong><br />

HW (IOS, IOS-XR, NX-OS)<br />

Applications<br />

2. a<br />

Controllers<br />

And<br />

Agents<br />

Physical Virtual<br />

<strong>SDN</strong>:<br />

- Controller SW (<strong>Open</strong>Flow, onePK)<br />

- <strong>Open</strong>Flow 1.x support<br />

3.<br />

Virtual<br />

Overlays<br />

<strong>Open</strong> Clouds with<br />

Nexus 1000V<br />

- Multi-hypervisor<br />

- Multi-service<br />

- Multi-cloud<br />

- <strong>Open</strong>stack support<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 8


onePK & <strong>Open</strong>Flow<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 9


<strong>Open</strong>Flow is Built on onePK<br />

NETCONF Agent CIM Agent<br />

Element<br />

Interface<br />

<strong>Open</strong>Flow<br />

Agent<br />

<strong>ONE</strong> Agent Framework (proposed agents)<br />

Puppet Agent Prime agent Custom Agent onePK Mgmt<br />

Apps<br />

Agents<br />

onePK Presentation APIs (C, Java, Python, ...)<br />

Comm libraries<br />

Comm libraries<br />

onePK Abstraction APIs<br />

Developer U6li6es Discovery Policy Rou6ng Datapath Ext…<br />

<strong>Cisco</strong> <strong>Network</strong> Opera6ng System (IOS, IOS-­‐XE, IOS-­‐XR, NX-­‐OS) (PlaAorm PI Code)<br />

<strong>Cisco</strong> <strong>Network</strong> Opera6ng System (IOS, IOS-­‐XE, IOS-­‐XR, NX-­‐OS) (PlaAorm PD Code)<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 10<br />

onePK<br />

Client<br />

Process<br />

boundary<br />

onePK<br />

Server


© C97-708996-00 2011 <strong>Cisco</strong> <strong>and</strong>/or © 2012 its affiliates. <strong>Cisco</strong> <strong>and</strong>/or All rights its affiliates. reserved. All rights reserved.<br />

<strong>Cisco</strong> Confidential 11


C97-712303-00 © 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential<br />

12


“An open solution for VM<br />

mobility in the Data-Center”<br />

“A way to reduce the<br />

CAPEX of my network<br />

<strong>and</strong> leverage commodity<br />

switches”<br />

“A solution to build virtual<br />

topologies with optimum<br />

multicast forwarding behavior”<br />

“A way to optimize link utilization in my network<br />

enhanced, application driven routing”<br />

“A means to get assured<br />

quality of experience for<br />

my cloud service offerings”<br />

Simplified<br />

Operations<br />

“A platform for developing new<br />

control planes”<br />

“A means to scale my fixed/mobile<br />

gateways <strong>and</strong> optimize<br />

their placement”<br />

“A way to optimize broadcast TV delivery<br />

Enhanced<br />

by optimizing cache placement <strong>and</strong><br />

cache selection”<br />

“A way to distribute policy/intent, e.g. Agility<br />

for DDoS prevention, in the network” “A way to configure my entire network<br />

as a whole rather than individual<br />

devices”<br />

“An open solution for customized flow forwarding<br />

control in <strong>and</strong> between Data Centers”<br />

“A solution to build a very large<br />

scale layer-2 network”<br />

New<br />

Business<br />

Opportunities<br />

“Develop solutions at software speeds: I don’t<br />

want to work with my network vendor or go<br />

through lengthy st<strong>and</strong>ardization.”<br />

“A means to do<br />

traffic engineering<br />

without MPLS”<br />

“A way to build my own<br />

security/encryption solution”<br />

“A solution to get a global view of the<br />

network – topology <strong>and</strong> state”<br />

“A way to<br />

scale my<br />

firewalls <strong>and</strong><br />

load<br />

balancers”<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 13


The Big Picture<br />

• <strong>Open</strong> <strong>Network</strong> <strong>Environment</strong> –<br />

Complementing the Intelligent <strong>Network</strong><br />

Preserve what is working:<br />

Resiliency, Scale <strong>and</strong> Security,<br />

Comprehensive feature-set<br />

Evolve for Emerging Requirements:<br />

Operational Simplicity, Programmability,<br />

Application-awareness<br />

• The <strong>Open</strong> <strong>Network</strong> <strong>Environment</strong><br />

integrates with existing infrastructure<br />

<strong>Software</strong> <strong>Defined</strong> <strong>Network</strong> concepts are a<br />

component of the <strong>Open</strong> <strong>Network</strong> <strong>Environment</strong><br />

Programmatic<br />

APIs<br />

<strong>Open</strong><br />

<strong>Network</strong> <strong>Environment</strong><br />

Agents <strong>and</strong><br />

Controllers<br />

Simplified Operations<br />

Enhanced Agility <strong>Network</strong> Monetization<br />

The <strong>Open</strong>Flow protocol can be used to link agents <strong>and</strong> controllers, <strong>and</strong> as such is component of<br />

<strong>SDN</strong> as well<br />

<strong>Network</strong><br />

Virtualization<br />

Infrastructure<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 14


• What Could Possibly Go Wrong?<br />

• Plenty!<br />

• One MSDC estimates that ~10% of new<br />

switches are cabled incorrectly<br />

• Cascading effect: bad cabling -> bad autoconfig<br />

-> bad network behavior<br />

• The network needs to save us from ourselves.<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 15


CLI<br />

SNMP<br />

HTML<br />

XML<br />

AAA<br />

CDP<br />

Syslog<br />

Netflow<br />

Routing Protocols<br />

Span<br />

Traditional Approach<br />

IOS / XR / SE / NXOS<br />

Monitoring<br />

Policy<br />

Interface<br />

Discovery<br />

Routing<br />

Data Plane<br />

Actions<br />

Events<br />

App<br />

EEM (TCL)<br />

New Paradigm<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 16<br />

App<br />

C<br />

Java<br />

Anything you can think of


Applications<br />

That YOU<br />

Create<br />

onePK<br />

Any <strong>Cisco</strong><br />

Router or<br />

Switch<br />

Flexible development environment to:<br />

• Innovate<br />

• Extend<br />

• Automate<br />

• Customize<br />

• Enhance<br />

• Modify<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 17


C97-712303-00 © 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential<br />

18


IOS / XE<br />

(Catalyst, ISR, ASR1K)<br />

C, JAVA Program<br />

onePK API Presentation<br />

onePK API Infrastructure<br />

NXOS<br />

(Nexus Platforms)<br />

IOS XR<br />

(ASR 9K, CRS)<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 19


Process Hosting<br />

<strong>Network</strong> OS<br />

Container<br />

onePK Apps<br />

Blade Hosting<br />

Blade<br />

<strong>Network</strong> OS<br />

Container<br />

onePK Apps<br />

Write Once, Run Anywhere<br />

End-Point Hosting<br />

onePK<br />

Apps<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 20<br />

External<br />

Server<br />

<strong>Network</strong> OS


Local firstorder<br />

analysis<br />

<strong>Network</strong> OS<br />

Time Scale (seconds)<br />

onePK Application<br />

“Agent”<br />

Frequent local actions<br />

Any communication protocol<br />

(xmpp, OF, CIM, REST, etc)<br />

Centralized<br />

Management /<br />

Orchestration Application<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 21<br />

Time Scale<br />

(minutes)<br />

Centralized<br />

coordination<br />

Consolidated<br />

central reporting.<br />

Meta- <strong>and</strong><br />

exception-analysis.


C97-712303-00 © 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential<br />

22


Base Service Set Description<br />

Data Path Provides packet delivery service to application: Copy, Punt, Inject<br />

Policy<br />

Provides filtering (NBAR, ACL), classification (Class-maps, Policy-maps), actions (Marking,<br />

Policing, Queuing, Copy, Punt) <strong>and</strong> applying policies to interfaces on network elements<br />

Routing Read RIB routes, add/remove routes, receive RIB notifications<br />

Element<br />

Get element properties, CPU/memory statistics, network interfaces, element <strong>and</strong> interface<br />

events<br />

Discovery L3 topology <strong>and</strong> local service discovery<br />

Utility<br />

Developer<br />

Syslog events notification, Path tracing capabilities (ingress/egress <strong>and</strong> interface stats,<br />

next-hop info, etc.)<br />

Debug capability, CLI extension which allows application to extend/integrate application’s<br />

CLIs with network element<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 23


Element<br />

System<br />

Interfaces<br />

Discovery<br />

CPU, Memory, Platform, Serial #, Versions, Uptime,<br />

Routing<br />

Location, OIR, CLI Changes<br />

Port, Slot, BW, MTU, TX/RX, BPS, PPS, Errors, Other Stats,<br />

QoS<br />

Config, Link Changes<br />

CDP, Security Topology Graph, Edges, Nodes, Topology Changes<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 24<br />

Application


Element<br />

System<br />

Interfaces<br />

Discovery<br />

Location<br />

IP address, MTU, Clear Stats, Shut/No Shut<br />

Filters<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 25<br />

Application


New Switch<br />

Cable Error: G0/3 to G0/1 on<br />

N3K-main. Should be G0/3 to G0/3<br />

on N3K-main.<br />

Sorry. Fixed it.<br />

Cabling Verified. Starting<br />

interface config<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 26


application<br />

2. Get Wiring Diagram<br />

3. Compare Actual<br />

to Diagram<br />

4a. Send/Receive XMPP<br />

XMPP<br />

1. Get Actual Topology<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 27<br />

TFTP<br />

hostname-topo


application<br />

5. Apply Config<br />

4b. Get Config For Good<br />

Interfaces<br />

3. Compare Actual<br />

to Diagram<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 28<br />

TFTP<br />

hostname-Ethernet1-1-conf


application<br />

1. Application Could Run on Switch<br />

2. Works Out of The Box<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 29


PoAP<br />

• Automated base<br />

config<br />

• OVA download<br />

Containers<br />

• Run apps in virtual<br />

machines on the<br />

switch<br />

onePK<br />

• Apps get deep,<br />

programmatic access<br />

to device<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 30


Policy<br />

Routing<br />

QoS<br />

Security<br />

RIB, Next-Hop, metric, AD, scope<br />

(VRF), Changes<br />

Configured Classes<br />

Configured ACLs<br />

Application<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 31


Policy<br />

Routing<br />

QoS<br />

Security<br />

Static routes<br />

Service-Policies (Police, Mark, Shape,<br />

Queue)<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 32<br />

ACLs<br />

Application


Get Routes<br />

Set Routes<br />

Sample Code.<br />

Subject to Change<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 33


Example: Custom Routing<br />

Data Center Traffic Forwarding Based on a Custom Algorithm<br />

ISR Pricing 2<br />

Route A Route B<br />

$1<br />

$2<br />

$3<br />

$1<br />

$2<br />

$3<br />

1<br />

3<br />

App<br />

Destination<br />

Route A<br />

Route B<br />

Unique Data Forwarding Algorithm Highly Optimized<br />

for the <strong>Network</strong> Operator’s Application<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 34<br />

onePK


Initial Setup: Default routing using EIGRP<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 35


Routing for Dollars: Application driven routes installed in network<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 36


Tracing the application installed route – using the developer <strong>and</strong> element services<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 37


Data Plane<br />

Copy or Punt Packets<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 38<br />

Application


Data Plane<br />

Inject New or Modified Packets<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 39<br />

Application


TRY(rc, onep_dpss_register_for_packets(<br />

ne1,<br />

dpss,<br />

targ_left,<br />

interesting_class,<br />

<strong>ONE</strong>P_DPSS_ACTION_PUNT,<br />

encrypt_callback,<br />

(void *)intf_left,<br />

&reg_h<strong>and</strong>le), "Register for packets");<br />

Sample Code<br />

Subject to Change<br />

Where traffic goes next<br />

Defines traffic of interest<br />

Action to take on<br />

interesting traffic<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 40


Problem: Customers want custom encryption on specific traffic types<br />

Value proposition: Punt traffic of interest, encrypt, <strong>and</strong> re-inject.<br />

1. Policy APIs on ingress router are set to<br />

punt telnet <strong>and</strong> syslog to app<br />

2. App encrypts punted traffic <strong>and</strong> re-injects<br />

into data path.<br />

3. Policy APIs on egress router punt telnet<br />

<strong>and</strong> syslog to app<br />

4. App decrypts punted traffic <strong>and</strong> re-injects<br />

into data path.<br />

5. Traffic that does not match policy passes<br />

through unencrypted.<br />

onePK application<br />

onePK application<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 41<br />

telnet<br />

http<br />

5<br />

http<br />

telnet<br />

encrypt http<br />

1<br />

encrypt<br />

2<br />

Unsecure<br />

<strong>Network</strong><br />

3<br />

encrypt<br />

telnet<br />

4


What Client Sees<br />

What Wireshark Sees<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 42


Security Five Ways<br />

Code Isolation<br />

Strong Typing<br />

AAA (PKI)<br />

Encryption (TLS)<br />

Code<br />

Security<br />

Runtime<br />

Security<br />

App<br />

Security<br />

onePK<br />

Digital Signing<br />

Certification Process<br />

Container<br />

Security<br />

Admin<br />

Security<br />

CLI Control<br />

Resource Allocation<br />

Isolation<br />

Resource Consumption<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 43


BUILD, AUTOMATE, IMPROVE<br />

SPEED & FASTER ADAPTABILITY<br />

EXTEND<br />

REVENUE & COST SAVINGS<br />

SIMPLICITY, INTEGRATION & THE POWER OF CHOICE<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 44


onePK Sample Applications<br />

© 2011 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 45


Thank you.<br />

© 2012 <strong>Cisco</strong> <strong>and</strong>/or its affiliates. All rights reserved. <strong>Cisco</strong> Confidential 46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!