|
On July 6, MWS and VMware experts held a webinar "How to ensure continuity and security of branch IT infrastructure." They discussed how to use the Cloud SD-WAN cloud solution to halve network infrastructure support costs, connect new branches in 5 minutes, and increase data availability. They also answered questions from the audience in detail. The most interesting parts are in the Q&A section.
Does Cloud SD-WAN allow you to add familiar applications if they do not exist? For example, 1C?
The default list of applications and protocols contains over a thousand items that work wordpress web design agency out of the box. If support for an application that is not on the standard list is required, it can be described manually.
Is it possible to view orchestrator statistics from the client side? Or is it only used for monitoring by data center operators?
The control panel is designed specifically to allow customers to analyze the operation of their infrastructure. Customers retain rights to view monitoring data, statistics, access to diagnostic tools, and also retain access to configuration. You can make changes - add VLANs, change policies, etc. If you have questions or difficulties using the portal, CloudMTS technical support specialists will come to the rescue.
Tell me, is it possible to switch traffic between two LTE channels? For example, there are SIM cards of two operators. If, for example, the first one “falls” and it is necessary to switch to the second one. Is such an implementation possible?
Yes, this is the basic functionality of SD-WAN, which provides transparent and unnoticeable switching for the client between any data transmission channels, including wireless ones. You can use channels of several operators simultaneously (up to 8 active channels) or alternately in case of network failure.
Is it possible to implement SD-WAN in a secure environment certified under Federal Law 152? Have you had such experience?
Yes, it is possible. We have tested it. It is possible to host virtual Edge SD-WAN inside vCloud Director or in another secure segment virtualization environment, provided that the necessary requirements are met.
Is it possible to use Cloud SD-WAN with GOST VPN?
Yes, you can. There are several scenarios with installing crypto gateways before or after Edge SD-WAN. Much depends on which GOST VPN you use, which manufacturer, since they have different functionality. We have positive use cases where such a bundle works great: channel aggregation is preserved, application prioritization is maintained, and all this is easy to manage.
Is it possible to see all devices connected to the network in the orchestrator?
Yes, it is possible, even if the network is large with hundreds of devices. It is possible to solve inventory tasks, download lists of all devices, enable filtering by certain criteria, identify objects with unstable channels, perform the necessary settings, remotely implementing the required operations.
How is data in the cloud protected from external influences?
It is worth noting that SD-WAN is a technology for ensuring data transmission. The data itself is not stored in SD-WAN. The orchestrator is just a management system. No one sees your data, it is protected by unique session keys. Availability and security of control components (what is provided as a service) is ensured in accordance with the SLA in 24/7 mode by dedicated NOC specialists.
How is the cluster protected and backed up in case of a failure?
The cluster itself already assumes that one device duplicates another. From the point of view of redundancy of the control system, the route information system - all this is duplicated and reserved. The devices themselves at the Data Plane level (plane of processing network packets) work even if the centralized system is unavailable. All functions, including channel aggregation and fast switching, continue to be performed.
|
|