GVFD - Gigamon Visibility Fabric Design


GVFD - Gigamon Visibility Fabric Design


Price
Length : 2 days
$1,995.00

This 2-day course covers the architecture design of a Visibility Solution featuring Gigamon, whiteboarding, coaching and how to understand and architect your network in a way which takes full advantage of the Visibility solution. This course focuses on critical considerations for working with this type of technology in a variety of environments (Enterprise, Cloud and Service Provider).

About this Course

In this 2-day hands-on course you will learn the essential information and develop the key skills to enable you to design a Gigamon® Visibility Fabric™ deployment. Multiple discussion labs support the learning objectives and allow you to practice the lessons learned in class.

You will learn common terminology to describe the basic challenges and architectures for security solutions. The basic challenges and architectures presented for Cloud solutions (Private, Public and Hybrid) will help you to prepare for modern deployments. You will understand the basic challenges and architectures for utilizing analytical solutions to ensure your designs and deployments are achieving the desired goals.

The Visibility Fabric Design labs will assist you in understanding various networking architectures where the Gigamon Visibility Fabric™ can dramatically improve security and visibility. You will learn the most important design considerations given essential requirements and existing network infrastructure. During these labs, you will discuss the different Gigamon technologies that can be used to achieve specific goals.

Who should attend

  • Solution Architects
  • Pre-Sales Engineers
  • Security Professionals

Class Prerequisites

  • Basic understanding of networking concepts
  • Familiarity with network security and monitoring tools
  • Conversant with
    • in-line and out-of-band security architectures
    • Service Provider terminology and architectures (2G, 3G, 4G, 5G, LTE)
    • Private and public cloud architectures
    • In-line and out-of-band Enterprise monitoring architectures.

What You Will Learn

  • Describe today’s security and performance monitoring challenges
  • Learn to architect solutions that counter security threats
  • Understand the important challenges of deploying Gigamon Visibility Fabric
  • Prepare for multi-vendor solution deployments

Outline

Module 1: Architecting for Security

  • Understanding Security Threats
  • Attack Evolution
  • Challenges in Detecting Threats
  • Basic Security Architectural Concepts

Module 2: Overview of Gigamon Secure Platform

  • Architecture
  • Components
  • Deploying for
    • Inline Tools
    • Out-of-band Tools
    • Redundancy (Tool Groups, N+1)
    • Asymmetric Routing
  • Using NetFlow (Metadata)
  • Cloud Security Architectures
    • VMware, OpenStack, and AWS
    • Private, Public, Hybrid
  • Examples
    • Simple Inline Tool
    • Inline and Out-of-Band
    • Redundancy

Module 3: Architectural Challenges Monitoring in Service Provider Networks

  • Basic Service Provider Network—Diversity of Topologies
  • Internal Operations
  • Unified Tool Rail Concept
  • Detecting and Responding to
    • Performance Degradation
    • Outages
    • Protecting Customer Information and Metrics
    • Analytics/Trending
  • Deploying Gigamon Visibility Fabric
    • In Conjunction with Different Technologies (3G, 4G, LTE, 5G)
    • For Customer Experience
    • For Monitoring Internal Operations
    • For Analytics/Trending
  • Examples
    • Comparison of 3G, 4G, LTE, 5G
    • CE Tools
    • Clustering

Module 4: Architecting for the Cloud

  • Basic Cloud Architectures (VMware, OpenStack, AWS)
  • Virtual Network Basics
  • ISDN and NFV
  • Integration with the Enterprise
  • Deploying
    • VMware
      • Basic Virtual Networking
      • NSX and SDDC
    • OpenStack
      • Monitor from Within (Agent Based)
    • Public Clouds—AWS
    • Asymmetric Routing
  • Using NetFlow (Metadata)
  • Cloud Security Architectures (VMware, OpenStack, AWS)
  • Examples
    • Private Cloud
    • Public Cloud
    • Hybrid

Module 5: Architecting for Analytics

  • Challenges
    • Performance
    • Security Challenges
    • Architectural—Monitoring Tools (Moore\'s Law)
  • Understanding Traffic Sources (SPAN vs. TAP)
  • Basic Monitoring Challenges (dropping and duplicate packets)
  • Deploying Gigamon Visibility Fabric in a Clustered Deployment
    • Scaling to Accommodate Traffic Volume
      • Load Balancing
      • Filtering
      • Centralizing Tools
      • Remote/Branch office
      • Tool Rails
      • New Company Acquisition
      • Virtual to Physical
      • Lights Out Operation
    • Examples
      • Multi-deployments
      • Opex/Capex Efficiency through Centralization
    LABS
    • Lab 1: Security Architecture for Internet Edge and Remote Locations
      • The goal of this activity is to design a security solution based on customer-specific requirements and Gigamon best practices for the Internet segment. This lab challenges you to increase the overall security visibility and reliability of the Internet edge segment by using Gigamon Visibility Fabric™.
    • Lab 2: Security Architecture for Data Center
      • You will create and present a recommended architecture and describe how Gigamon technologies and solutions are being used in the Data Center environment. In this lab you will face specific Data Center challenges and your goal is to describe and select an appropriate Gigamon solution.
    • Lab 3: Customer Experience in Service Provider Environment
      • Demonstrate your understanding of how Gigamon technologies are deployed in a Service Provider environment. This lab challenges you to meet Service Provider requirements such as monitoring subscriber’s traffic and intergradation with external analytics, billing, and other tools.
    • Lab 4: Analytics and Trending in Service Provider Environment
      • Describe how Gigamon technologies can help Analytics tools to be more efficient, and how to choose appropriate subscriber aware features for a Service Provider environment
    • Lab 5: Architecture for Public Cloud
      • Present recent examples of how Gigamon technologies and solutions are being used in public and hybrid cloud environments, and to describe important design considerations that should be reviewed before deploying a solution.
    • Lab 6: Architecture for Private Cloud
      • Deploy Gigamon technologies in two widely used private cloud environments: VMware and OpenStack. You will describe the important design considerations that should be reviewed before deploying a solution.
    • Lab 7: Enterprise Analytics in a Multi-Tool Environment
      • The goal of this activity is to present a recommended architecture and describe how Gigamon technologies and solutions are being used in the Enterprise network for application and network performance monitoring as well as for customer experience management.
    • Lab 8: Basic Architecture for Efficiency
      • Present a recommended architecture and describe how Gigamon technologies and centralized monitoring tools can decrease Capex and Opex for a company.

 

Class Dates:

Classes being scheduled,
call 1-800-755-0142 or

Contact Us with your request.

On Site Class Available

ExpertONE Learning Solutions Provider Microsoft Certified Partner Logo GSA Advantage