Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Words...

  • Simplify
  • Agility
  • Intent
  • Automate

How can Extreme Create Value?

So what?

DNA looks VERY similar to Extreme Automated Campus; however, when you get into the details you will see that DNA is simply a marketing wrap for multiple disjointed products.

Solution

Leadership

Application

Time

Simplicity

Governance

Control

Behavior

How many interfaces and touch points are required for network management? Sometimes 70% of the time it takes to fix a network problem is spent just trying to identify where the problem is located.

Experience

Simple Control

Disaggregation

Time to Value

A New Approach

Availability

Network Agility?

What is the Risk?

Risk

  • Today, many networks are based on fragile architectures where change represents risk.
  • Network managers are being asked to deliver more services and to make changes at an ever-increasing pace with constrained budgets.
  • Prepare for the future by making the unknown - known through data and analytics.

What is Cisco saying about security?

Micro-segments

Software Defined Access solution...

  • Extend Micro-segmentation to the Campus Network for breach containment and to prevent lateral moves
  • Policy-based control for access to segments.

Malware

Stealthwatch

  • Cisco estimates that 70% of malware is in encrypted traffic

  • Use of machine learning to identify encrypted malware

What is Cisco Saying about Assurance and SD-WAN?

SD-WAN

  • Integration of Viptela into DNA architecture
  • Simplify WAN and simplify interconnect to cloud based providers
  • Extending fabric to the WAN via Viptela

Strengths

Weaknesses

Culture - A network company focused culture of market disruption that leverages open technology to deliver better customer value...

  • Rank 3rd in the Gartner 2018 Magic Quadrant (moved up from 14th). Extreme is now recognized as a leader.
  • Our simplified next generation ethernet solution delivers competitive differentiation with built-in policy, fabric and analytics.
  • Great 100% insourced services with a focus of 1st call resolution (avoid SmartNET Fatigue).

Market Share - Organic market share growth is slow due to competition. No presence in the device, server and storage technologies compared to Cisco and HP...

  • The use of cloud servers is lowering Data Center sales and especially core business.
  • Lack of awareness - Customers may not know who we are and how we can create value for them.
  • Non-technical people making buying decisions. In this case, Cisco's marketing becomes an advantage.

Opportunities

Risk

Threats

Focus - Cisco and HP are focused on competing in other market segments outside of the network business. Our research and development capabilities are focus on the network business.

  • It is prime-time for merchant silicon technologies. Broadcom ASICs are becoming highly differientiated when compared to the status quo.
  • Resource Control - Linux containers enable rapid adoption of technologies with built-in openness.
  • Multi-rate (1,2.5,5G and 25, 50, 100G) networking technologies will become the norm for both Data Center and Enterprise networks.

Acceptance - Cloud or so called "SDN solutions" like Meraki, Cisco DNA and ACI are completely closed-looped. If successful Cisco will lock us out of accounts.

  • White-box solutions reflect customers are becoming more cost conscious so the profit margins have become low so pricing is an issue.
  • Cisco continues to in-organically improve it's position in the market through acquisitions. Cisco is using a “Buy-the-startups” approach to innovation.
  • Fear of not going with the market leader and defending a best-in-breed solution. This is becoming less and less of an issue with our improved position.

Guidelines

Guidelines...

The Extreme Experience

Assign types of functionality to specific places in the network. Leverage proven repeatable configurations. Modularity divides these pieces up into manageable chunks. Each topology should be designed and configured using the same tools where possible

  • Leverage policy and automation
  • Filtering/aggregating reachability information
  • Forwarding traffic over long(er) geographic distances

Manage Change

Decouple product complexity from network complexity, identify where we want to isolate faults. The problem is a network is not really a single system. It’s a group of interacting systems

  • In principle, redundancy is easy, any system with more parallel paths through the system will fail less often
  • Adding paths is a tradeoff.
  • Increases MTBF in one layer
  • Increases MTTR in another layer
  • Devices within each fault domain only compute paths within their fault domain.

Adopt a Simple Approach

How would modular design help? Can you tolerate a reasonable degree of network downtime or degradation? How can a simple approach meet your expectations based on testing, best practices and a comprehensive "network centric" control plane?

  • Once the topology reached a predetermined size can intentional design decision be made to meet future requirements.
  • Leverage built-in intelligence avoid bolting-on additional technology?
  • Build-out not up and increase the size of the hub don't just add a layer?

MTTR

MTBF

Identify the balance between Resilience and Redundancy...

The key is to establish a balance between MTBF and MTTR. In the real world, the point where MTTR and MTBF meet is between two and three parallel structures...

  • One is almost always too little if you want resiliency.
  • Four is almost always too many – And five is right out.
  • This applies at all levels of redundancy.

  • Circuit/link.
  • Device.
  • Modular Core.

What is Fast Convergence?

Detect

Calculate and Switch

Notify

Make each step as fast as possible but not at the cost of network stability

Three steps

– Detect

– Notify

Link State Flooding

– Tuned flooding timers

– Reduce flooding domain

Distance Vector

– Reduce update scope (query range)

– Calculate

– Switch

Respond

Management and Security Loop

Pivot

Detect

Management is normally a “slower” loop" which reacts to organic threats...

  • Changes in the technology.
  • Software Upgrades.
  • Normal adds and moves.

Security is a "faster loop" which reacts to inorganic threats...

  • Attacks designed to deny service, obtain access, discover information, etc.
  • Designed to deny service, obtain access, discover information, etc.
  • Looks to assure compliance and an assurance of best practices.

Know the...

  • Business drivers
  • Change Management
  • Worst Case Analysis

Management Guidelines

Understand the...

  • Design requirements
  • Replacement Technology
  • Policy Modification

Establish the...

  • Documentation Baseline
  • Performance Baseline
  • Utilization Analysis

Analyze the...

  • Best Fit
  • Root Cause
  • Best Practices

Make a plan for change...

Topology (Document the trade-offs in your design and know how to back out of the project).

  • Layer 2 and 3 (Collapsed or Spine Leaf).
  • Link utilization (Time of day or seasonal).
  • Outside Services Used (MPLS or Metro).

Policy (Agree and document best practices).

  • Where its applied? (Wire and Wireless).
  • The intent behind the policy (Automation Security).
  • Compliance requirements (HIPPA or PCI).

Modular Boundaries (Normal failure rates).

  • Where they are the boundaries? (Campus or Multi-site).
  • What is the intent behind the boundary? (Security or fault-based).
  • How do you measure? (Does the design meet the business requirement?).

Make a Security Plan...

Crunchy on the outside, chewy in the middle.

  • Ask every device to deliver some level of security.
  • Establish Automatic (fast) feedback loops.
  • Leverage vendor APIs to deliver Crunchy-ness through and through.

What can my network do to make things crunchy through and through?

  • Automated anomaly detection and leverage analytics on network traffic
  • Understand the target or the type of attack? Decide what happens if you toss this traffic, scrub it, honeypot it, or... ??
  • Determine if I need to change my edge policies? – Should you allow an automated process to handle edge policies as needed?

Understand the Attack Vector...

Crunchy on the Outside - One of my machines has been zombied – What is the address of the master host? On what port did they get through?

  • Decide - Where do I implement new filters to stop this from happening in the future? What is the best way to block this specific attack?

  • Act - Wait for a change window. Implement the new filters.

  • Test - Avoid false positives impacting poor end-user experience.

A simpler way?

Solution

With 40% of IT becoming generalists by 2021, service and support will be critical.

Gartner ranks Extreme Networks #1 in service and support.

Simplify the Edge

Edge

The Rapid Adoption of IoT Creates Security Risks

It’s important functionality is:

  • Secure onboarding, for security purposes, once the Adapter is disconnected from the network (or loses power), it loses its profile and network services are disabled to the old port
  • When reconnected, the Adapter connects to the Defender application to get its profile and to provision the network services on the port/ AP
  • No network IT involvement required!

Defender

Services are provisioned at the edge.

From 4-10 Protocols to 1

Fabric

Time to Value

Services

Service your network like a Strategic Asset...

History

100%

in-sourced

The Infrastructure Guy?

Scarcity has shifted from code to operations

Software

Operations

Customer

Need

8/9 of the Iceberg is below water,

Most of the needs of the consumers are below surface

94% first person resolution

The key to our Extreme Net Promoters Score

  • 8.5 year avg. tenure of support team
  • Calls routed directly to Engineer.
  • 8.9 out of 10 Extreme customers say they would recommend.

94% first person resolution

Time is the key

  • Not always just break-fix.
  • Address Network issues
  • Prevent future service interruption.

It is all about time!

Time to Detect

Time to Respond

Managed Services

Effort

Fight well beyond your weight class?

Time

Response Plus Managed services

Mike Tyson

Plan

"Everyone has a plan till someone gets punch in the Mouth."

Prepare

Know your challenge

Sometimes even Wyatt Erp

Execute

Leverage your Partners

Needs Doc Holiday

Take Action

not just Monitor

Take

Action

Competitive

Cisco

DNA Strengths

Cisco Fabric is an EVPN derivative (Control plane based on LISP). It provides separation of location and identity. Cisco heavily promotes the value of its custom ASICs within the Catalyst 9300 and 9400 touting features such as 32MB packet buffers, 384K Flex Counters, 64K x2 Netflow records.

  • Intent Based framework is complex and expensive.
  • Using CLI breaks controller based deployments
  • Requires Cisco Professional Services).

Cisco will be pitching their quantitative results in terms of reduced time to service, improved mean time repair, less on-boarding time etc. Their results look very similar to stats Extreme has had for many years.

Cisco talks about a two pronged strategy consisting of Software-Defined Access and Software-Defined WAN. Their installed base of WAN / CPE routers put them in a position of strength to migrate that base to SD-WAN.

Weaknesses

Response

Cisco is trying to create a financial lock-in. Cisco will position this OpEx model as a way to dis-aggregate the software investment from the hardware investment. Thus, customers are able to benefit from continuous innovation and maintain continuity of their software through generations of hardware churn. Cisco ONE has been designed around large Enterprises that don’t have price sensitivities, as Cisco owns the Fortune 100 practically unchallenged. The Cisco ONE pricing model allows them to position the Catalyst 9k at a 20% premium.

Is DNA going to be a another repeat of ACI which many customers could not get to work due to its complexity? To avoid this Cisco has introduced a host of DNA Services (Pro Services) to try to enable adoption. One of the major values that Cisco talks about is its zero-touch provisioning capabilities. Extreme offers a simpler approach with it’s Zero Touch Provisioning +.

Extreme is focused on using merchant silicon (like the rest of the industry) for faster time to service and so we can focus on what is really of value…. The software. Custom ASIC development is time consuming with new chips taking an average of 2-3 years.

Fabric

Extreme Platform

Extreme Strengths

Extreme’s Automated Campus offers a consistent architecture across wired and wireless. With support for Fabric Attach (on ExtremeWireless today, coming soon for WiNG) and consistent policy enforcement, analytics capabilities and management between wired (EXOS) and wireless, the Extreme Automated Campus offers a unified solution. The native security strengths of the Fabric are also nicely complemented by the capabilities of ExtremeAnalytics, allowing the extraction of metadata from DPI to feed other security tools in the architecture and deal with breaches that make it past the initial lines of defense.

Integrated XMC software delivers great time-to-value with consistent application visibility and fabric to edge policy enforcement. Our policy plus hyper-segmentation capabilities have been proven unbreakable in Hackathons at CalTech, Syracuse University and others.

  • Security - Stealth, frictionless hyper-segmentation capabilities. Defender delivers security fore IoT.
  • Analytics - Massive and customizable fingerprinting
  • End to end - Consistent architecture for converged campus/ Data Centers

Weaknesses

Response

How many protocols do you want? Cisco Campus Fabric (LISP, VXLAN and TrustSec) is based on technologies that haven’t had market uptake. Plus, their fabric requires a L3 routed underlay to function; therefore, you are simply adding complex overlays to an already complex underlay.

Furthermore, Cisco is lacking consistency between the campus and data center architectures. Fabrics need to be stitched together via MG-BGP and segmentation and policy are different concepts that need to be manually patched together to achieve any sort of integration

Fabric Connect is based on Ethernet (MAC-in-MAC) and IP (IS-IS) – technologies all customers easily understand. It enables customers to migrate away from complex overlays.

  • Ethernet 2.0 - Extreme Fabric runs native w/o additional protocols features flexible edge-only policy based provisioning.
  • Simplicity - Fabric Connect is so logical and intuitive, customers have deployed on their own with only a 2hr hands-on introduction from an SE
  • Multi-casting built-in featuring Distributed Virtual Routing.

Extreme XMC

DNA Center

Extreme Management Center is a fully integrated solution that offers a single tool for network management, access control and analytics. Only Extreme Offers Single Pane of Glass Management with a 360 degree view

Extreme provides consistent Layer 7 control and visibility across wired and wireless. Analytics data is merged with policy data and location data to provide customers a complete 360 degree view . This dramatically reduces the number of tools the customer needs for insight and visibility and simplifies the overall operations of the network.

In next generation networking, it’s the tool set and quality of experience that matters. And this is where Extreme and it’s carefully integrated solution really shines. Furthermore, applications at L7 (on wired and wireless) are automatically detected (regardless of port) and based on their identity have the right policy applied dynamically.

DNA Center (which is Cisco umbrella management system) is nothing but a marketing wrap that consists of multiple disjointed point products (ISE, APIC-EM, NDP) that are not integrated!

Cisco ISE is limited to Layer 4 policies, which do not provide the granularity required to control your network on a per device per user per application basis.

With their disaggregated tool set that doesn’t provide consistent Layer 7 control and visibility, Cisco doesn’t have the capabilities of Extreme to differentiate between network performance issues and application performance issues.

Although Cisco mentions support for wireless in its marketing materials; their solution is clearly wired-centric. Policy, control and analytics support has not changed for wireless with the introduction of DNA and remains disjointed. The only thing of note for wireless in the DNA architecture is that the Wireless LAN Controller (WLC) participates in the LISP control plane of the Fabric.

It comes down to...

With Cisco,

With Extreme,

you are going to have to buy more products. Integrate those products. Spend a fortune on pro-services to get everything working and deal with a mound of complexity when something breaks.

Cisco offers ACI in the Data Center and DNA in the campus. The controllers are different (APIC versus APIC-EM) and the underlying technologies are different (COOP versus LISP) requiring MP-BGP to be used to bridge the two together.

Ask your customer how much they are going to have to pay Cisco to actually deploy this solution? And how will they troubleshoot it when something breaks?

Cisco offers multiple disjointed tool sets for analytics that provide similar capabilities with varying degrees of integration. For example application recognition and location information require different tool sets.

Quality of Experience is everything. You will end up purchasing fewer products that fill the same need. Every part of your IT operations from deployment to daily management is vastly simplified through the fully integrated wired and wireless solution.

One architecture, one protocol and one operational model. What could be easier? Extreme offers edge-only policy based provisioning of Hyper-segments that are easy to deploy, manage and troubleshoot.

ExtremeAnalytics also offers network and application performance QoE by base lining response times for critical applications and alarming when something is out of range. Network operators can see impacted clients, create events and quickly drill down to troubleshoot.

Strengths

Weaknesses

Culture - A network company focused culture of market disruption that leverages open technology to deliver better customer value...

  • Rank 3rd in the Gartner 2018 Magic Quadrant (moved up from 14th). Extreme is now recognized as a leader.
  • Our simplified next generation ethernet solution delivers competitive differentiation with built-in policy, fabric and analytics.
  • Great 100% insourced services with a focus of 1st call resolution (avoid SmartNET Fatigue).

Market Share - Organic market share growth is slow due to competition. No presence in the device, server and storage technologies compared to Cisco and HP...

  • The use of cloud servers is lowering Data Center sales and especially core business.
  • Lack of awareness - Customers may not know who we are and how we can create value for them.
  • Non-technical people making buying decisions. In this case, Cisco's marketing becomes an advantage.

Opportunities

Risk

Threats

Focus - Cisco and HP are focused on competing in other market segments outside of the network business. Our research and development capabilities are focus on the network business.

  • It is prime-time for merchant silicon technologies. Broadcom ASICs are becoming highly differientiated when compared to the status quo.
  • Resource Control - Linux containers enable rapid adoption of technologies with built-in openness.
  • Multi-rate (1,2.5,5G and 25, 50, 100G) networking technologies will become the norm for both Data Center and Enterprise networks.

Acceptance - Cloud or so called "SDN solutions" like Meraki, Cisco DNA and ACI are completely closed-looped. If successful Cisco will lock us out of accounts.

  • White-box solutions reflect customers are becoming more cost conscious so the profit margins have become low so pricing is an issue.
  • Cisco continues to in-organically improve it's position in the market through acquisitions. Cisco is using a “Buy-the-startups” approach to innovation.
  • Fear of not going with the market leader and defending a best-in-breed solution. This is becoming less and less of an issue with our improved position.

Guidelines

Design Guidelines...

Adopt a Simple Approach

How would modular design help? Can you tolerate a reasonable degree of network downtime or degradation? How can a simple approach meet your expectations based on testing, best practices and a comprehensive "network centric" control plane?

  • Once the topology reached a predetermined size can intentional design decision be made to meet future requirements.
  • Leverage built-in intelligence avoid bolting-on additional technology?
  • Build-out not up and increase the size of the hub don't just add a layer?

Manage Change

Decouple product complexity from network complexity, identify where we want to isolate faults. The problem is a network is not really a single system. It’s a group of interacting systems

  • In principle, redundancy is easy, any system with more parallel paths through the system will fail less often
  • Adding paths is a tradeoff.
  • Increases MTBF in one layer
  • Increases MTTR in another layer
  • Devices within each fault domain only compute paths within their fault domain.

The Extreme Experience

Assign types of functionality to specific places in the network. Leverage proven repeatable configurations. Modularity divides these pieces up into manageable chunks. Each topology should be designed and configured using the same tools where possible

  • Leverage policy and automation
  • Filtering/aggregating reachability information
  • Forwarding traffic over long(er) geographic distances

Identify the balance between Resilience and Redundancy...

The key is to establish a balance between MTBF and MTTR. In the real world, the point where MTTR and MTBF meet is between two and three parallel structures...

  • One is almost always too little if you want resiliency.
  • Four is almost always too many – And five is right out.
  • This applies at all levels of redundancy.

  • Circuit/link.
  • Device.
  • Modular Core.

MTTR

MTBF

What is Fast Convergence?

Make each step as fast as possible but not at the cost of network stability

Three steps

– Detect

– Notify

Link State Flooding

– Tuned flooding timers

– Reduce flooding domain

Distance Vector

– Reduce update scope (query range)

– Calculate

– Switch

Detect

Notify

Calculate and Switch

Management and Security Loop

Respond

Management is normally a “slower” loop" which reacts to organic threats...

  • Changes in the technology.
  • Software Upgrades.
  • Normal adds and moves.

Security is a "faster loop" which reacts to inorganic threats...

  • Attacks designed to deny service, obtain access, discover information, etc.
  • Designed to deny service, obtain access, discover information, etc.
  • Looks to assure compliance and an assurance of best practices.

Pivot

Detect

Management Guidelines

Establish the...

  • Documentation Baseline
  • Performance Baseline
  • Utilization Analysis

Know the...

  • Business drivers
  • Change Management
  • Worst Case Analysis

Analyze the...

  • Best Fit
  • Root Cause
  • Best Practices

Understand the...

  • Design requirements
  • Replacement Technology
  • Policy Modification

Make a plan for change...

Topology (Document the trade-offs in your design and know how to back out of the project).

  • Layer 2 and 3 (Collapsed or Spine Leaf).
  • Link utilization (Time of day or seasonal).
  • Outside Services Used (MPLS or Metro).

Policy (Agree and document best practices).

  • Where its applied? (Wire and Wireless).
  • The intent behind the policy (Automation Security).
  • Compliance requirements (HIPPA or PCI).

Modular Boundaries (Normal failure rates).

  • Where they are the boundaries? (Campus or Multi-site).
  • What is the intent behind the boundary? (Security or fault-based).
  • How do you measure? (Does the design meet the business requirement?).

Make a Security Plan...

Crunchy on the outside, chewy in the middle.

  • Ask every device to deliver some level of security.
  • Establish Automatic (fast) feedback loops.
  • Leverage vendor APIs to deliver Crunchy-ness through and through.

What can my network do to make things crunchy through and through?

  • Automated anomaly detection and leverage analytics on network traffic
  • Understand the target or the type of attack? Decide what happens if you toss this traffic, scrub it, honeypot it, or... ??
  • Determine if I need to change my edge policies? – Should you allow an automated process to handle edge policies as needed?

Understand the Attack Vector...

Crunchy on the Outside - One of my machines has been zombied – What is the address of the master host? On what port did they get through?

  • Decide - Where do I implement new filters to stop this from happening in the future? What is the best way to block this specific attack?

  • Act - Wait for a change window. Implement the new filters.

  • Test - Avoid false positives impacting poor end-user experience.

A simpler way?

Solution

With 40% of IT becoming generalists by 2021, service and support will be critical.

Gartner ranks Extreme Networks #1 in service and support.

Fabric Attach

Simplifies

the Edge

Edge

X440 (PoE Edge)

Wired

  • 12, 24 and 48-port (Fixed Format)
  • Stacking with License (4 SFP+ built-in)
  • Policy (simplicity with multi-auth)

Flow-Based Visibility

Wireless

Hardware, Virtualized, Cloud-Enabled

Control

C5215

  • 100-1,000 APs
  • 2,000 AP in H/A
  • HW crypto accel
  • 2 x SFP+ Interfaces
  • 2 x GE Interfaces
  • GE Mgmt Port
  • 16,000 Users
  • 32,000 Users

C5215 appliance

30136         WS-C5215 WLAN CONTROLLER

Maximum of 1000 Access Points

C5215 Controller

firmware: 10.41.01

5215 Details

30136         WS-C5215 WLAN CONTROLLER

Advanced Functions

Advance Features

Edge Fabric

Fabric Attach

AP39xx as Fabric Attach Client - no need to configure a switch port for an AP.

ExtremeLocation™

IoT

AP39xx to provide presence information to ExtremeLocation™.

Hot Spot 2.0

User and Application visibility

Device onboarding/authentication

Reporting (User, devices, bandwidth, application, security, inventory, uptime, etc.)

LOCATION BASED SERVICES

Experience

HYBRID APPROACH TO LOCATIONING

Hybrid

ENGAGEMENT WITH IMPACT

Bluetooth

Before

Experience

Apps Everywhere

After

Full Visibility

SuperSpec 2x2 APs

Super Spec

Flexibility

  • Start with premise-based, convert to cloud
  • Start with cloud, move to premise-based
  • Same hardware
  • Investment protection

AP3915/17

  • Entry-Level Indoor & Outdoor
  • 11ac Wave 2, 11an, 11gn
  • 2x2:2 SS, Dual band & radio
  • 1.6 Gbps capacity
  • MU-MIMO
  • RF Spectrum Analysis
  • 4x integral antennae array
  • 802.3af PoE
  • IoT & Cloud-Ready

ExtremeWireless™

Key Features

AP3915 = AP7632

AP3917 = AP7662

Details

  • Integration with ExtremeAirDefense™ - AP39xx as AirDefense Sensors.
  • Integration with ExtremeLocation™ - Retail analytics through ExtremeWireless™ AP39xx devices.
  • ExtremeWireless™ AP39xx as FabricAttach client.
  • IOT: Extend convergence of IOT functions
  • AP as iBeacon RTLS report
  • AP as Thread™ Border Gateway

AP3915i Indoor AP

DNA

  • AP3915 are derivative product of the AP3912i. (Uses the Dakota chipset)
  • Shares the HW & SW design as Wing AP7632, 7662
  • Common SW image with AP3912i/16ci.

Antenna Patterns –

AP3915i

Antenna Patterns 3915

Antennas and Accessories

How to Order the 3915

Antennas and Accessories

How to Order the 3917

The Rapid Adoption of IoT Creates Security Risks

Defender

It’s important functionality is:

  • Secure onboarding, for security purposes, once the Adapter is disconnected from the network (or loses power), it loses its profile and network services are disabled to the old port
  • When reconnected, the Adapter connects to the Defender application to get its profile and to provision the network services on the port/ AP
  • No network IT involvement required!

Defender

Simple and Secure Device Mobility

Follow me

Wired devices can be unplugged and moved easily from one network port to the other...

From 4-10 Protocols to 1

Services are provisioned at the edge.

Benefits…

  • Faster to Deploy
  • Stability
  • Faster Resiliency

Fabric

Simple Two-Tier

Overall Design

Why a New Approach

The new approach

Conventional versus Fabric-based

Conventional v Fabric

  • Fabric eliminates the need to map VLANs at every step.

Connect

Candybar

Attach

Software is the key to our differentiation

Competition

Time-to-Value

Time to Value

Service your network like a Strategic Asset...

Services

History

of Great Services

History

Strategic Asset

100%

in-sourced

The Infrastructure Guy?

Operations

Scarcity has shifted from code to operations

Software

Customer

Need

Scarcity has shifted from

code to operations

8/9 of the Iceberg is below water,

Most of the needs of the consumers are below surface

94% first person resolution

94% first person resolution

The key to our Extreme Net Promoters Score

  • 8.5 year avg. tenure of support team
  • Calls routed directly to Engineer.
  • 8.9 out of 10 Extreme customers say they would recommend.

Time is the key

Time to Detect

It is all about time!

Time to Respond

  • Not always just break-fix.
  • Address Network issues
  • Prevent future service interruption.

Advanced Services

How?

The Extreme Difference

Less Stress

Why?

Better Support

What you get?

Portal

The Portal

Fight well beyond your weight class?

Effort

Response Plus Managed services

Managed Services

Time

"Everyone has a plan till someone gets punch in the Mouth."

Plan

Mike Tyson

Discovery

Sessions Outline

Outline

Onboarding

Time

Time

Optimization

Process Overview

Process

Managed Service On-boarding

Monitoring Appliance – Architectural Overview

Architectural

Data Collection

Data

Industry Verified

Results

#1 Ranked Service/Support – Gartner

Why Extreme: Customer-Driven Networking

Buzz

Agile, Adaptive, Secure #1 Ranked Service & Support Nimble, Right-Sized Company

Know your challenge

Prepare

Sometimes even Wyatt Erp

Leverage your Partners

Execute

Needs Doc Holiday

Take Action

not just Monitor

Take Action

Competitive

Cisco

Cisco Fabric is an EVPN derivative (Control plane based on LISP). It provides separation of location and identity. Cisco heavily promotes the value of its custom ASICs within the Catalyst 9300 and 9400 touting features such as 32MB packet buffers, 384K Flex Counters, 64K x2 Netflow records.

  • Intent Based framework is complex and expensive.
  • Using CLI breaks controller based deployments
  • Requires Cisco Professional Services).

DNA Strengths

Weaknesses

Cisco will be pitching their quantitative results in terms of reduced time to service, improved mean time repair, less on-boarding time etc. Their results look very similar to stats Extreme has had for many years.

Cisco talks about a two pronged strategy consisting of Software-Defined Access and Software-Defined WAN. Their installed base of WAN / CPE routers put them in a position of strength to migrate that base to SD-WAN.

Response

Cisco is trying to create a financial lock-in. Cisco will position this OpEx model as a way to dis-aggregate the software investment from the hardware investment. Thus, customers are able to benefit from continuous innovation and maintain continuity of their software through generations of hardware churn. Cisco ONE has been designed around large Enterprises that don’t have price sensitivities, as Cisco owns the Fortune 100 practically unchallenged. The Cisco ONE pricing model allows them to position the Catalyst 9k at a 20% premium.

Is DNA going to be a another repeat of ACI which many customers could not get to work due to its complexity? To avoid this Cisco has introduced a host of DNA Services (Pro Services) to try to enable adoption. One of the major values that Cisco talks about is its zero-touch provisioning capabilities. Extreme offers a simpler approach with it’s Zero Touch Provisioning +.

Extreme is focused on using merchant silicon (like the rest of the industry) for faster time to service and so we can focus on what is really of value…. The software. Custom ASIC development is time consuming with new chips taking an average of 2-3 years.

Extreme Platform

Fabric

Extreme’s Automated Campus offers a consistent architecture across wired and wireless. With support for Fabric Attach (on ExtremeWireless today, coming soon for WiNG) and consistent policy enforcement, analytics capabilities and management between wired (EXOS) and wireless, the Extreme Automated Campus offers a unified solution. The native security strengths of the Fabric are also nicely complemented by the capabilities of ExtremeAnalytics, allowing the extraction of metadata from DPI to feed other security tools in the architecture and deal with breaches that make it past the initial lines of defense.

Extreme Strengths

Weaknesses

Integrated XMC software delivers great time-to-value with consistent application visibility and fabric to edge policy enforcement. Our policy plus hyper-segmentation capabilities have been proven unbreakable in Hackathons at CalTech, Syracuse University and others.

  • Security - Stealth, frictionless hyper-segmentation capabilities. Defender delivers security fore IoT.
  • Analytics - Massive and customizable fingerprinting
  • End to end - Consistent architecture for converged campus/ Data Centers

How many protocols do you want? Cisco Campus Fabric (LISP, VXLAN and TrustSec) is based on technologies that haven’t had market uptake. Plus, their fabric requires a L3 routed underlay to function; therefore, you are simply adding complex overlays to an already complex underlay.

Furthermore, Cisco is lacking consistency between the campus and data center architectures. Fabrics need to be stitched together via MG-BGP and segmentation and policy are different concepts that need to be manually patched together to achieve any sort of integration

Response

Fabric Connect is based on Ethernet (MAC-in-MAC) and IP (IS-IS) – technologies all customers easily understand. It enables customers to migrate away from complex overlays.

  • Ethernet 2.0 - Extreme Fabric runs native w/o additional protocols features flexible edge-only policy based provisioning.
  • Simplicity - Fabric Connect is so logical and intuitive, customers have deployed on their own with only a 2hr hands-on introduction from an SE
  • Multi-casting built-in featuring Distributed Virtual Routing.

Extreme XMC

DNA Center

Extreme Management Center is a fully integrated solution that offers a single tool for network management, access control and analytics. Only Extreme Offers Single Pane of Glass Management with a 360 degree view

Extreme provides consistent Layer 7 control and visibility across wired and wireless. Analytics data is merged with policy data and location data to provide customers a complete 360 degree view . This dramatically reduces the number of tools the customer needs for insight and visibility and simplifies the overall operations of the network.

In next generation networking, it’s the tool set and quality of experience that matters. And this is where Extreme and it’s carefully integrated solution really shines. Furthermore, applications at L7 (on wired and wireless) are automatically detected (regardless of port) and based on their identity have the right policy applied dynamically.

DNA Center (which is Cisco umbrella management system) is nothing but a marketing wrap that consists of multiple disjointed point products (ISE, APIC-EM, NDP) that are not integrated!

Cisco ISE is limited to Layer 4 policies, which do not provide the granularity required to control your network on a per device per user per application basis.

With their disaggregated tool set that doesn’t provide consistent Layer 7 control and visibility, Cisco doesn’t have the capabilities of Extreme to differentiate between network performance issues and application performance issues.

Although Cisco mentions support for wireless in its marketing materials; their solution is clearly wired-centric. Policy, control and analytics support has not changed for wireless with the introduction of DNA and remains disjointed. The only thing of note for wireless in the DNA architecture is that the Wireless LAN Controller (WLC) participates in the LISP control plane of the Fabric.

With Cisco,

It comes down to...

With Extreme,

you are going to have to buy more products. Integrate those products. Spend a fortune on pro-services to get everything working and deal with a mound of complexity when something breaks.

Cisco offers ACI in the Data Center and DNA in the campus. The controllers are different (APIC versus APIC-EM) and the underlying technologies are different (COOP versus LISP) requiring MP-BGP to be used to bridge the two together.

Ask your customer how much they are going to have to pay Cisco to actually deploy this solution? And how will they troubleshoot it when something breaks?

Cisco offers multiple disjointed tool sets for analytics that provide similar capabilities with varying degrees of integration. For example application recognition and location information require different tool sets.

Quality of Experience is everything. You will end up purchasing fewer products that fill the same need. Every part of your IT operations from deployment to daily management is vastly simplified through the fully integrated wired and wireless solution.

One architecture, one protocol and one operational model. What could be easier? Extreme offers edge-only policy based provisioning of Hyper-segments that are easy to deploy, manage and troubleshoot.

ExtremeAnalytics also offers network and application performance QoE by base lining response times for critical applications and alarming when something is out of range. Network operators can see impacted clients, create events and quickly drill down to troubleshoot.

Stages

Create

Vision

Gain

Interest

History

Match

with

Outcome!

Change

Thinking

Beyond Speeds and Feeds

Disruptive approach to networking is needed

Network as a Strategic Asset

Build your network as

a strategic asset.

upside down

Drivers...

  • Too many manual processes
  • Change/Config management difficulties
  • Maintenance Window inhibits new technology implementation
  • Provisioning difficulties

SDN

Network-Wide Abstractions

32x100G Edge-Core with ONIE

Facebook

White Boxes

Broadcom Trident 3 Published (Less Than $3000)?

Who owns your network?

Ownership

Right to Repair

Open versus Closed

Open

Story

Mothership

Heritage

These times

they are a chaning 1964.

Future

  • Containing the Failure Domain with no downtime – planned or unplanned
  • High bandwidth
  • Automate provisioning, change control and upgrades

Linux Value Curve Plus Merchant Silicon

Switch

Super spec

  • Switches
  • Access Points
  • Servers

Merchant

Switching Chips

Feature Creep

What is your Persona?

Persona

What is your prospects persona?

SDN

What is OpenFlow?

Reality

SDN is a framework...

Framework

Traditional Network Technology

Traditional

Abstracting control from forwarding?

Abstracting

Directly programmable?

Policy

CLI deployment

CLI

Fabric as a Commodity

Spine Leaf

Great Networks are Built like…

Simple

Goals

a candybar.

Goals

Competitive

v MPLS

The Rise of Disaggregation

Clos Networks

Fat-tree

(Blocking characteristics)

Spine

Leaf

Agility

Disaggregation

Spine Leaf Goals - Optimized for Performance while Ensuring Interoperability, Flexibility, Scalability...

  • Delivers Investment Protection with the best total long-term costs
  • Leverages Best-in-Class Storage, Compute, Orchestration, and Hypervisors
  • No vendor lock-in – standards-based

You can never have enough...

fn(x,y,z)

  • Complete Agility
  • Customers want Scale. made easy.
  • Hypervisor integration

Dis-aggregate

What?

Ask yourself, is your networks faster today, more than it was 3 years ago?

Build out not up!

Out not Up

  • 3-tier networks simple to build / good for north-south traffic
  • But not great for east-west traffic related to growth of virtualized apps
  • Leaf-spine designs help ease these problems

No Chassis religion required

Control protocols are implemented as Higher Layer Entities. External Agent may provide control instead of the distributed protocols

De-couple

The data plane is comprised of

A MAC Relay and

At least two ports

Double every 18 Months

Moores Law

He has been right for 50 years

Can network bandwidth deliver?

Compute

GAP

Gap

Network

With Compute and Storage?

Broadcom Tomahawk

ASICs

According to Amazon CTO

According to

Quantum Physics

The

end

10 years to the next big thing!

Our goal is to transform our customers’ businesses through powerful yet simple networks.

Solutions

No Chassis Religion

No Chassis

Religion

but we recognize the use case.

Disaggregation

  • Multi-tenancy with Integrated Security
  • Low and predictable latency
  • Mix and match multiple generations of technologies

Challenges & Needs

Extended Ethernet (“Like a Chassis”)

Extended

BPEs are configured and managed through the controlling bridge (CB) user interface.

  • Single point of license management.
  • Single point for configuring/debugging/diagnostics.
  • Single node when managed by Extreme Management Center or other management software products.

Comparing

DNA

Cisco One

Flexible

Cisco ONE Simplifies Software Purchasing

Licensing

What do you own?

Cisco One

Purpose Built Applications Ongoing Innovation License Portability & Flexibility

Cisco ONE

A-la-carte model continues to be available

  • Simplified ordering and ongoing entitlement
  • Updates and upgrades included (requires mandatory Cisco Software Support Service (SWSS) beyond year 1)
  • Licenses portable for hardware refreshes (requires SWSS beyond year 1)
  • Better together pricing i.e., discounted bundle
  • Customers are more likely to be current on software versions

Details

Cisco ONE Competitive Analysis

Analysis

Extreme’s Competitive Advantages

  • Secure Automated Campus – Security, Simplicity and Intelligence
  • Fabric Connect – Proven Simplicity & Enhanced Security (Stealth & Hyper-segmentation)
  • Extreme Management Center – Superior Analytics, Visibility & Control for Wired & Wireless
  • Best of bread switching and wireless solutions
  • Extreme’s existing product and services offers are simpler and have price advantages
  • Extreme’s #1 ranked support

Network as a Sensor

Establish Trust Boundaries and

Policy Enforcement Points - The network touches every element of the digital enterprise – every business process, device, customer, employee – and therefore has the unique ability to detect, analyze, and prevent new forms of attack by flagging unusual network behavior.

Frictionless

Networking

Faster Threat Detection from days to Hours.

Network as an Enforcer

Design

The Why?

The Why

Assure

Plug n Play

Faster Network Services Provisioning

Hands-on

APIs

Direct Costs

Pre-staging & Shipping costs

Travel costs

Complexity

Configuration errors

Different products, IOS Releases

Security

3rd party not secure

Rogue devices

Time/Productivity

Manual process

Shipping , Storage, Travel

North South

East West

Reduced Network Installation Costs.

Cisco Business Objectives

Message

Quantitative Proof Points

DNA

Switches

  • Reduce provisioning time by 67%
  • Reduced security breach impact by 48%
  • Improved issue resolution by 80%
  • Improved OPEX expenses by 61%

IoT on-boarding (gathered from trials)

  • Design time 2 hours to 15 mins
  • Policy 4 hours to 5 mins
  • Provisioning 5 hours to 5 mins.

Products

Cisco Catalyst 9000 Family At-A-Glance

At a Glance

CAT 9K Competitive Analysis

Analysis

High Level

Value

Cat 9300 Pricing

Pricing

Cisco Catalyst 9400 (A New Era in Networking

Chassis

Sup 1

Design

Next Gen

ASICs

Backplane

TCAM

Dual

Unicast

Multicast

Line cards

Line

cards

Architechture

24x mGig RJ45 Line Card

24x SFP+

Line Card

Forwarding

uplinks

Power

Fans

Fail

over

ISSU

Nerdsville

CLI

Control

Summary

“Cisco and the seven dwarfs”

History

Over the past 10 years, Cisco is focused on other things.

Past

like...

  • Compute.
  • Storage.
  • Security.

Kind of a strange new Control plane?

Today

DNA

ACI

Cisco's new SDN play in the form of ACI and DNA take place of previous propietary "lock-ins" like IGRP, EIGRP and CDP.

1984

Cisco History

Sandra Lerner and Leonard Bosack are the husband-wife pair*, who founded Cisco Systems Inc in 1984. While working as computer operation staff at Stanford they realized the need for a device that would enable users across different networks to share and exchange data.

Cisco sold its first router in 1986 and by the end of 1987, the fledgling company was recording sales worth $250,000 each month. Despite making a high profit margin (24%) they were running short of cash to run the company and therefore decided to make a deal with the famed venture capitalist Don Valentine of Sequoia Capital to fund their company. Don appointed John Morgridge as the CEO of the company, to overlook the management and financing. Sandra and John had a rocky start to being with and soon enough each of them thought the other was not fit for the company.

  • Lerner claims that the first words from Morgridge's mouth when they met were "I hear that you're everything that's wrong with Cisco.
  • "The first time I met John Morgridge he had already been hired," Lerner says

Who Is Cisco?

117B Market Capitalization

59B in Revenue

10B Net Profits

34B More Cash than Debt

6.3B Research and Development

Who is Cisco today?

Application Policy Infrastructure Controller

APIC Controller

APIC-EM similarity to Smartphone - The APIC-EM has:

  • A strong base platform for SDN use cases
  • It has build in App’s (eg QoS, ACL, Policy etc)
  • It offers an API to be used by ISV & App’s can be developed by many One App example – Jabber / Unified communication integration

"Like a phone"

Learn more about creating dynamic, engaging presentations with Prezi