How Enterprises Can Prepare for the Intent-Based Network

By |2019-07-24T14:01:31+00:00March 22nd, 2019|Categories: DNA Center, intent-based networking, Security Solutions|Tags: |

Intent-based networking, or IBN, is positioned to redefine how enterprises manage their IT infrastructure. With the explosion in the number of mobile and IoT devices, video, streaming and SaaS applications, network intents such as identities, segmentation rules, and security policies require continuous adjustments. Today, this is mostly done manually, and often [...]

How Can Network Automation Be Improved With SDN

By |2019-03-25T14:50:37+00:00March 22nd, 2019|Categories: Automation, Network Security, SDN, Software-Defined Networking|Tags: |

As networks are quickly transforming into platforms for agile applications and analytics, IT leaders are challenged to achieve greater efficiencies through network automation. Traditionally, network automation involved simple scripts embedded in device configurations to handle repetitive tasks. For the most part, network provisioning and configurations were manually performed. The manual processes [...]

How Cisco ACI and Cisco DNA Center Work

By |2019-07-24T14:01:38+00:00March 16th, 2019|Categories: Application-Centric Infrastructure (ACI), DNA Center, intent-based networking|Tags: , |

The move to virtualize enterprise networks began several years ago. Because the work is complex, Cisco, the industry’s leading network equipment supplier, delivered a variety of solutions. Two key elements are Cisco Application Centric Infrastructure (ACI), the centerpiece in its Software-Defined Network (SDN) story, and Cisco Digital Network Architecture (Cisco DNA) [...]

Build a Next Gen Network with SDN and IBN

By |2019-07-24T14:02:39+00:00March 8th, 2019|Categories: Application-Centric Infrastructure (ACI), DNA Center, intent-based networking, SD-WAN, Software-Defined Networking|Tags: |

Historically, configuring network switches, firewalls and other infrastructure components was a slow, largely manually process. Generally, a network operator entered configuration changes through the Command Line Interface for each piece of equipment.  The old-fashioned approach was inflexible, the installation process was time-consuming, and the deployments were error-prone. […]