-
Modern companies need to be agile so that they can adapt quickly and flexibly to changes in their environment. The same applies to architectures in enterprise networks, provider networks and cloud computing. Network security is also playing an increasingly important role in the design of these networks.This course provides an overview of the current technologies and processes in the various networks and explains various coupling concepts between LAN and WAN. In addition to technological developments, it uses current products to show how a modern network design can be implemented.
-
Course Contents
-
- Software-defined networking in networks
- The controller in SDN and overview of current controller products
- ACI from Cisco and VMWare NSX
- Multi-layer design in enterprise networks
- Security and design concepts
- Current WLAN technologies and WLAN site surveys
- The 5G mobile communications standard and its tasks in the enterprise network
- Virtualization in the data center – server versus container virtualization
- Software-defined data center – VMWare Aria, MS Azure Stack, and Open Stack
- Data storage: DAS, NAS, and SAN
- Software-defined storage with Ceph, Gluster FS, and VMWare Virtual SAN
- Server technologies
- Data center network design
- WAN transport networks – MPLS and Internet
- Overlay networks – VXLAN, NVGRE, Geneve, IPSec VPN
- Site connections with SD-WAN
- Cloud computing and design
- Modern cloud-native applications
- Design recommendations and requirements
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 200,- plus VAT (only for classroom participation). -
Target Group
-
The course is aimed at presales staff, consultants and decision-makers who are planning a network that will meet future requirements. The course teaches sales employees which product families are used in the various IT networks.
-
Knowledge Prerequisites
-
The course assumes familiarity with LAN and WAN terms as well as knowledge of the basic working methods of various technologies and protocols.
| 1 | Das Netzwerk im Wandel |
| 1.1 | Motivation für SDN |
| 1.1.1 | Nachteile klassischer Netzwerke |
| 1.1.2 | Agilität |
| 1.2 | Definition von SDN |
| 1.2.1 | Aufgaben von Control und Data Plane |
| 1.2.2 | Klassische Netzwerke |
| 1.2.3 | Zentrale Steuerung |
| 1.2.4 | Network Programmability |
| 1.3 | Software-Architektur des Controllers |
| 1.3.1 | North- & Southbound-Protokolle |
| 1.3.2 | Controller Redundanz und Skalierbarkeit |
| 1.4 | Underlay-Vernetzung |
| 1.4.1 | Wirkungsbereich des Controllers |
| 1.4.2 | Remote-Zugriff auf SDN-Komponenten |
| 1.4.3 | NETCONF |
| 1.4.4 | OpenFlow |
| 1.5 | Overlay-Vernetzung |
| 1.5.1 | Motivation für Overlay-Netze |
| 1.5.2 | VXLAN-Tunnel |
| 1.5.3 | NVGRE |
| 1.5.4 | Geneve |
| 1.6 | Übersicht: Controller-Produkte |
| 1.7 | Application Centric Infrastructure (ACI) von Cisco |
| 1.8 | VMware NSX |
| 1.8.1 | Details zu VMware NSX |
| 1.8.2 | NSX Distributed Firewall |
| 1.8.3 | Edge Devices |
| 2 | Der Trend: Cloud Computing |
| 2.1 | IT im Wandel |
| 2.2 | Treiber für die Cloud |
| 2.2.1 | Verfügbarkeit des Business |
| 2.2.2 | Von fixen zu variablen Kosten |
| 2.2.3 | Agile Infrastruktur |
| 2.2.4 | Technologisch immer aktuell |
| 2.2.5 | Sicherheit und Compliance |
| 2.3 | Typische Herausforderungen und Einwände |
| 2.3.1 | Anforderungen an die Cloud Provider |
| 2.3.2 | Faktoren für die Kundenzufriedenheit |
| 2.4 | Virtualization – Enabler für die Cloud |
| 2.5 | Definition: Cloud Computing |
| 2.5.1 | Service-Modelle des Cloud Computings |
| 2.5.2 | Die verschiedenen Cloud-Varianten (Private Cloud, Public Cloud, …) |
| 2.5.3 | Multi-Cloud |
| 2.5.4 | Eigenschaften der Hyperscaler |
| 2.5.5 | Shared Responsibility |
| 3 | Applikationen in der Cloud |
| 3.1 | Applikationen in der Cloud |
| 3.1.1 | Aufbau von Applikationen |
| 3.1.2 | Eignungsprüfung für Applikationen in der Cloud |
| 3.2 | Cloud Native Applications |
| 3.2.1 | 12-Factor-App |
| 3.2.2 | Versionsverwaltung |
| 3.2.3 | Saubere Trennung des eigentlichen Codes von anderem |
| 3.2.4 | Build, Release, Run |
| 3.2.5 | Stateless Applications |
| 3.2.6 | Web Services und Port-Bindung |
| 3.3 | Microservices |
| 3.3.1 | Monolith vs. Microservices |
| 3.4 | Horizontale Skalierbarkeit |
| 3.4.1 | Weitere Faktoren |
| 3.4.2 | Erweiterung des 12-Factor-Konzepts |
| 3.4.3 | CAP-Theorem |
| 3.5 | Das Chaos-Monkey-Prinzip |
| 3.6 | Pets vs. Cattle |
| 4 | Server-Virtualisierung |
| 4.1 | Server-Zentralisierung und Edge Computing |
| 4.2 | Server-Virtualisierung |
| 4.2.1 | Vorteile: Schnelles Provisioning und Pooling |
| 4.2.2 | Vorteile: Automation und Hochverfügbarkeit |
| 4.2.3 | Vorteile: Konsolidierung und Green IT |
| 4.2.4 | Virtualisierungstechniken |
| 4.3 | VMware vSphere |
| 4.3.1 | Lizenzierung in vSphere 8 |
| 4.3.2 | Aufgaben der Virtualisierungsschicht |
| 4.3.3 | Virtuelle Netzwerke |
| 4.3.4 | Festplatten und Laufwerke |
| 4.3.5 | Migration virtueller Maschinen |
| 4.3.6 | vMotion |
| 4.3.7 | Distributed Resource Scheduling (DRS) |
| 4.3.8 | High Availability (HA) |
| 4.3.9 | Fault Tolerance |
| 4.4 | Microsoft Hyper-V |
| 4.5 | Citrix XenServer |
| 4.6 | QEMU & KVM |
| 4.6.1 | KVM |
| 4.6.2 | libvirt |
| 4.7 | Virtual Desktop Infrastructure |
| 5 | Containerization |
| 5.1 | Container-Virtualisierung |
| 5.1.1 | Linux Containers (LXC) |
| 5.1.2 | Container- vs. Server-Virtualisierung |
| 5.2 | Docker |
| 5.3 | Kubernetes |
| 5.3.1 | Kubernetes Pod |
| 5.3.2 | Kubernetes-Deployment |
| 5.3.3 | Kubernetes Services |
| 6 | Modernes Data Center Design |
| 6.1 | Server-Technologien (Rackmount, Blade, ...) |
| 6.1.1 | Komplettlösungen |
| 6.2 | Physischer Zugriff |
| 6.3 | Data Center Network Design |
| 6.3.1 | Netzwerk-Separation in virtualisierten Umgebungen |
| 6.3.2 | Load-Balancing |
| 6.3.3 | WDM zwischen den Rechenzentren |
| 6.3.4 | Service Virtualization |
| 6.4 | Hohe Ressourcen-Ausnutzung und Energieeffizienz |
| 6.5 | Kühlung |
| 6.6 | Data Center Design Trends |
| 7 | Speicher-Virtualisierung und Software-Defined Storage |
| 7.1 | Bedeutung des Datenspeichers |
| 7.1.1 | Direct Attached Storage |
| 7.2 | Netzwerkstorage |
| 7.2.1 | Network Attached Storage |
| 7.2.2 | Storage Area Networks |
| 7.3 | Datenspeicher in der Cloud |
| 7.3.1 | Object Storage |
| 7.4 | Speichervirtualisierung |
| 7.4.1 | Speichersystem-basierte Virtualisierung |
| 7.5 | Software-Defined Storage |
| 7.5.1 | Ceph |
| 7.5.2 | GlusterFS |
| 7.5.3 | VMware Virtual SAN |
| 7.6 | Hyperkonvergente Systeme (Hyper Converged Infrastructure) |
| 7.6.1 | NUTANIX |
| 7.6.2 | Dell EMC VxRail & VMware |
| 7.6.3 | HPE SimpliVity |
| 7.6.4 | Cisco HyperFlex HX Data Platform |
| 8 | Das Software-Defined Data Center |
| 8.1 | Das Software-Defined Data Center |
| 8.2 | VMware Aria und Cloud Foundation |
| 8.2.1 | Abstraktion der Ressourcen |
| 8.2.2 | VMware Aria Operations |
| 8.2.3 | VMware Aria Automation |
| 8.3 | Ausblick: Microsoft Azure Stack |
| 8.4 | OpenStack |
| 8.4.1 | Merkmale von OpenStack I |
| 8.4.2 | Module von OpenStack |
| 8.4.3 | Beispiel zur Netzwerkseparierung anhand von OpenStack |
| 8.4.4 | Security Groups |
| 9 | Migration in die Cloud |
| 9.1 | Applikations-Migration in die Cloud |
| 9.1.1 | Lift-and-Shift vs. Refactoring |
| 9.1.2 | Die 5 Rs der App-Modernisierung |
| 9.1.3 | Containerization |
| 9.1.4 | Der Hotel-California-Effekt |
| 9.2 | Datenmigration in die Cloud |
| 9.3 | Transition Phase |
| 9.3.1 | Technische Planung |
| 9.3.2 | Organisatorische Planung |
| 9.4 | Fallstricke |
| 10 | SD-WAN - Motivation und Einführung |
| 10.1 | Motivation für SD-WAN |
| 10.1.1 | Hybrid WAN: MPLS und Internet |
| 10.1.2 | Brownouts |
| 10.1.3 | Nutzung der Cloud |
| 10.1.4 | Komplexität |
| 10.1.5 | Visibility und Assurance |
| 10.1.6 | Skalierung des WAN |
| 10.1.7 | Secure Access Service Edge (SASE) |
| 10.1.8 | Anforderungen an SD-WAN |
| 11 | Klassische WAN-Technologien |
| 11.1 | WAN-Transportnetze |
| 11.1.1 | Mobilfunk-Netze |
| 11.1.2 | Das WAN aus Sicht von SD-WAN |
| 11.2 | MPLS |
| 11.2.1 | L2 und L3 Services auf Basis von MPLS |
| 11.2.2 | QoS in MPLS-Netzen |
| 11.2.3 | MPLS aus der Perspektive des SD-WAN |
| 11.3 | Internet |
| 11.3.1 | Autonome System |
| 11.3.2 | Anbindungsvarianten für Kunden-Netze |
| 11.3.3 | BGP-4 |
| 11.3.4 | Das Internet aus der SD-WAN Perspektive |
| 11.4 | Mobilfunk |
| 11.4.1 | 5G |
| 11.4.2 | Mobilfunk-Netze aus SD-WAN Perspektive |
| 11.5 | IP VPNs |
| 11.5.1 | IPSec |
| 11.5.2 | Die Verpackung im Tunnel Mode |
| 11.5.3 | Standortkopplung mit Site-to-Site-VPN |
| 11.5.4 | Dynamic Multipoint VPN (DMVPN) |
| 11.5.5 | Group Encrypted Transport (GET) VPN |
| 11.6 | Orchestrierung in klassischen WAN-Infrastrukturen |
| 12 | Architektur und Funktion des SD-WAN |
| 12.1 | Komponenten des SD-WAN |
| 12.2 | SD-WAN Controller Deployment |
| 12.2.1 | Cloud Based Controller für alle Kunden |
| 12.2.2 | On Premises |
| 12.2.3 | Cloud Hosted - Customer |
| 12.2.4 | Cloud Hosted - Vendor oder MSP |
| 12.2.5 | Redundanz des SD-WAN Controllers |
| 12.2.6 | Zugriff auf den Controller |
| 12.3 | Anbindung des SD-WAN Routers an das WAN |
| 12.3.1 | SD-WAN Router in der Customer Location |
| 12.3.2 | Anbindung an ein MPLS-Netzwerk |
| 12.3.3 | Integration in ein Campus LAN |
| 12.3.4 | Redundante Anbindung an das WAN |
| 12.3.5 | Site Redundancy |
| 12.3.6 | Onboarding des SD-WAN Routers |
| 12.4 | Routing |
| 12.4.1 | Graceful Restart |
| 12.5 | Overlay-Tunnel |
| 12.5.1 | Redundanz der Tunnel-Verbindungen |
| 12.5.2 | Topologien im SD-WAN Overlay |
| 12.5.3 | Schutz des Datenverkehrs |
| 12.5.4 | Alternative zum Tunnel: Secure Vector Routing |
| 12.6 | Application Based Routing |
| 12.6.1 | Reaktion auf Ausfälle |
| 12.6.2 | Erkennen von Applikationen |
| 12.7 | Performance Routing |
| 12.7.1 | Kriterien für das Performance Routing |
| 12.8 | Traffic Optimization |
| 12.8.1 | Optimierungen für VoIP und IPTV |
| 12.9 | QoS im SD-WAN |
| 13 | Cloud Integration und SASE |
| 13.1 | Cloud Services |
| 13.1.1 | Cloud-Nutzung |
| 13.1.2 | Public Cloud Applications - SaaS |
| 13.1.3 | Self-managed Applications in der Cloud - IaaS |
| 13.2 | Internet Access im SD-WAN |
| 13.2.1 | Direct Internet Access zu SaaS |
| 13.2.2 | Optimierung für Public Cloud Applications |
| 13.3 | Integration von Cloud Infrastrukturen |
| 13.3.1 | Optimierung mit Transit-Netzen |
| 13.3.2 | Integration von Collocations |
| 13.4 | Secure Access Service Edge (SASE) |
| 13.4.1 | Anbindung an SSE |
| 13.4.2 | Security Services im SSE |
| 13.4.3 | SASE Herstellerübersicht |
| 14 | Migration zu SD-WAN |
| 14.1 | Planerische Aspekte |
| 15 | SD-WAN-Hersteller |
| 15.1 | SD-WAN Marktüberblick |
| 15.1.1 | Hersteller-Auswahl |
| 15.2 | Hersteller-Übersicht |
| 15.2.1 | Cisco SD-WAN powered by Viptela |
| 15.2.2 | Cisco SD-WAN powered by Meraki |
| 15.2.3 | VMware |
| 15.2.4 | Fortinet Secure SD-WAN |
| 15.2.5 | Versa Networks |
| 15.2.6 | Citrix SD-WAN |
| 15.2.7 | HPE Aruba EdgeConnect (SilverPeak) |
| 15.2.8 | Palo Alto: Prisma SD-WAN |
| 15.2.9 | Aryaka |
| 15.2.10 | Juniper Contrail SD-WAN und 128T |
| 15.2.11 | Synopse der Hersteller-Lösungen |
| 16 | Zukunft des SD-WAN |
| 16.1 | Evolution des SD-WAN |
| 16.1.1 | Evolution zu SASE |
| 16.1.2 | Die Cloud als SD-WAN Backbone |
| 16.2 | MEF-Standards für SD-WAN |
| 16.2.1 | MEF 70.1 |
| 16.2.2 | SD-WAN Konzept nach MEF 70 |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
-
Modern companies need to be agile so that they can adapt quickly and flexibly to changes in their environment. The same applies to architectures in enterprise networks, provider networks and cloud computing. Network security is also playing an increasingly important role in the design of these networks.This course provides an overview of the current technologies and processes in the various networks and explains various coupling concepts between LAN and WAN. In addition to technological developments, it uses current products to show how a modern network design can be implemented.
-
Course Contents
-
- Software-defined networking in networks
- The controller in SDN and overview of current controller products
- ACI from Cisco and VMWare NSX
- Multi-layer design in enterprise networks
- Security and design concepts
- Current WLAN technologies and WLAN site surveys
- The 5G mobile communications standard and its tasks in the enterprise network
- Virtualization in the data center – server versus container virtualization
- Software-defined data center – VMWare Aria, MS Azure Stack, and Open Stack
- Data storage: DAS, NAS, and SAN
- Software-defined storage with Ceph, Gluster FS, and VMWare Virtual SAN
- Server technologies
- Data center network design
- WAN transport networks – MPLS and Internet
- Overlay networks – VXLAN, NVGRE, Geneve, IPSec VPN
- Site connections with SD-WAN
- Cloud computing and design
- Modern cloud-native applications
- Design recommendations and requirements
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 200,- plus VAT (only for classroom participation). -
Target Group
-
The course is aimed at presales staff, consultants and decision-makers who are planning a network that will meet future requirements. The course teaches sales employees which product families are used in the various IT networks.
-
Knowledge Prerequisites
-
The course assumes familiarity with LAN and WAN terms as well as knowledge of the basic working methods of various technologies and protocols.
| 1 | Das Netzwerk im Wandel |
| 1.1 | Motivation für SDN |
| 1.1.1 | Nachteile klassischer Netzwerke |
| 1.1.2 | Agilität |
| 1.2 | Definition von SDN |
| 1.2.1 | Aufgaben von Control und Data Plane |
| 1.2.2 | Klassische Netzwerke |
| 1.2.3 | Zentrale Steuerung |
| 1.2.4 | Network Programmability |
| 1.3 | Software-Architektur des Controllers |
| 1.3.1 | North- & Southbound-Protokolle |
| 1.3.2 | Controller Redundanz und Skalierbarkeit |
| 1.4 | Underlay-Vernetzung |
| 1.4.1 | Wirkungsbereich des Controllers |
| 1.4.2 | Remote-Zugriff auf SDN-Komponenten |
| 1.4.3 | NETCONF |
| 1.4.4 | OpenFlow |
| 1.5 | Overlay-Vernetzung |
| 1.5.1 | Motivation für Overlay-Netze |
| 1.5.2 | VXLAN-Tunnel |
| 1.5.3 | NVGRE |
| 1.5.4 | Geneve |
| 1.6 | Übersicht: Controller-Produkte |
| 1.7 | Application Centric Infrastructure (ACI) von Cisco |
| 1.8 | VMware NSX |
| 1.8.1 | Details zu VMware NSX |
| 1.8.2 | NSX Distributed Firewall |
| 1.8.3 | Edge Devices |
| 2 | Der Trend: Cloud Computing |
| 2.1 | IT im Wandel |
| 2.2 | Treiber für die Cloud |
| 2.2.1 | Verfügbarkeit des Business |
| 2.2.2 | Von fixen zu variablen Kosten |
| 2.2.3 | Agile Infrastruktur |
| 2.2.4 | Technologisch immer aktuell |
| 2.2.5 | Sicherheit und Compliance |
| 2.3 | Typische Herausforderungen und Einwände |
| 2.3.1 | Anforderungen an die Cloud Provider |
| 2.3.2 | Faktoren für die Kundenzufriedenheit |
| 2.4 | Virtualization – Enabler für die Cloud |
| 2.5 | Definition: Cloud Computing |
| 2.5.1 | Service-Modelle des Cloud Computings |
| 2.5.2 | Die verschiedenen Cloud-Varianten (Private Cloud, Public Cloud, …) |
| 2.5.3 | Multi-Cloud |
| 2.5.4 | Eigenschaften der Hyperscaler |
| 2.5.5 | Shared Responsibility |
| 3 | Applikationen in der Cloud |
| 3.1 | Applikationen in der Cloud |
| 3.1.1 | Aufbau von Applikationen |
| 3.1.2 | Eignungsprüfung für Applikationen in der Cloud |
| 3.2 | Cloud Native Applications |
| 3.2.1 | 12-Factor-App |
| 3.2.2 | Versionsverwaltung |
| 3.2.3 | Saubere Trennung des eigentlichen Codes von anderem |
| 3.2.4 | Build, Release, Run |
| 3.2.5 | Stateless Applications |
| 3.2.6 | Web Services und Port-Bindung |
| 3.3 | Microservices |
| 3.3.1 | Monolith vs. Microservices |
| 3.4 | Horizontale Skalierbarkeit |
| 3.4.1 | Weitere Faktoren |
| 3.4.2 | Erweiterung des 12-Factor-Konzepts |
| 3.4.3 | CAP-Theorem |
| 3.5 | Das Chaos-Monkey-Prinzip |
| 3.6 | Pets vs. Cattle |
| 4 | Server-Virtualisierung |
| 4.1 | Server-Zentralisierung und Edge Computing |
| 4.2 | Server-Virtualisierung |
| 4.2.1 | Vorteile: Schnelles Provisioning und Pooling |
| 4.2.2 | Vorteile: Automation und Hochverfügbarkeit |
| 4.2.3 | Vorteile: Konsolidierung und Green IT |
| 4.2.4 | Virtualisierungstechniken |
| 4.3 | VMware vSphere |
| 4.3.1 | Lizenzierung in vSphere 8 |
| 4.3.2 | Aufgaben der Virtualisierungsschicht |
| 4.3.3 | Virtuelle Netzwerke |
| 4.3.4 | Festplatten und Laufwerke |
| 4.3.5 | Migration virtueller Maschinen |
| 4.3.6 | vMotion |
| 4.3.7 | Distributed Resource Scheduling (DRS) |
| 4.3.8 | High Availability (HA) |
| 4.3.9 | Fault Tolerance |
| 4.4 | Microsoft Hyper-V |
| 4.5 | Citrix XenServer |
| 4.6 | QEMU & KVM |
| 4.6.1 | KVM |
| 4.6.2 | libvirt |
| 4.7 | Virtual Desktop Infrastructure |
| 5 | Containerization |
| 5.1 | Container-Virtualisierung |
| 5.1.1 | Linux Containers (LXC) |
| 5.1.2 | Container- vs. Server-Virtualisierung |
| 5.2 | Docker |
| 5.3 | Kubernetes |
| 5.3.1 | Kubernetes Pod |
| 5.3.2 | Kubernetes-Deployment |
| 5.3.3 | Kubernetes Services |
| 6 | Modernes Data Center Design |
| 6.1 | Server-Technologien (Rackmount, Blade, ...) |
| 6.1.1 | Komplettlösungen |
| 6.2 | Physischer Zugriff |
| 6.3 | Data Center Network Design |
| 6.3.1 | Netzwerk-Separation in virtualisierten Umgebungen |
| 6.3.2 | Load-Balancing |
| 6.3.3 | WDM zwischen den Rechenzentren |
| 6.3.4 | Service Virtualization |
| 6.4 | Hohe Ressourcen-Ausnutzung und Energieeffizienz |
| 6.5 | Kühlung |
| 6.6 | Data Center Design Trends |
| 7 | Speicher-Virtualisierung und Software-Defined Storage |
| 7.1 | Bedeutung des Datenspeichers |
| 7.1.1 | Direct Attached Storage |
| 7.2 | Netzwerkstorage |
| 7.2.1 | Network Attached Storage |
| 7.2.2 | Storage Area Networks |
| 7.3 | Datenspeicher in der Cloud |
| 7.3.1 | Object Storage |
| 7.4 | Speichervirtualisierung |
| 7.4.1 | Speichersystem-basierte Virtualisierung |
| 7.5 | Software-Defined Storage |
| 7.5.1 | Ceph |
| 7.5.2 | GlusterFS |
| 7.5.3 | VMware Virtual SAN |
| 7.6 | Hyperkonvergente Systeme (Hyper Converged Infrastructure) |
| 7.6.1 | NUTANIX |
| 7.6.2 | Dell EMC VxRail & VMware |
| 7.6.3 | HPE SimpliVity |
| 7.6.4 | Cisco HyperFlex HX Data Platform |
| 8 | Das Software-Defined Data Center |
| 8.1 | Das Software-Defined Data Center |
| 8.2 | VMware Aria und Cloud Foundation |
| 8.2.1 | Abstraktion der Ressourcen |
| 8.2.2 | VMware Aria Operations |
| 8.2.3 | VMware Aria Automation |
| 8.3 | Ausblick: Microsoft Azure Stack |
| 8.4 | OpenStack |
| 8.4.1 | Merkmale von OpenStack I |
| 8.4.2 | Module von OpenStack |
| 8.4.3 | Beispiel zur Netzwerkseparierung anhand von OpenStack |
| 8.4.4 | Security Groups |
| 9 | Migration in die Cloud |
| 9.1 | Applikations-Migration in die Cloud |
| 9.1.1 | Lift-and-Shift vs. Refactoring |
| 9.1.2 | Die 5 Rs der App-Modernisierung |
| 9.1.3 | Containerization |
| 9.1.4 | Der Hotel-California-Effekt |
| 9.2 | Datenmigration in die Cloud |
| 9.3 | Transition Phase |
| 9.3.1 | Technische Planung |
| 9.3.2 | Organisatorische Planung |
| 9.4 | Fallstricke |
| 10 | SD-WAN - Motivation und Einführung |
| 10.1 | Motivation für SD-WAN |
| 10.1.1 | Hybrid WAN: MPLS und Internet |
| 10.1.2 | Brownouts |
| 10.1.3 | Nutzung der Cloud |
| 10.1.4 | Komplexität |
| 10.1.5 | Visibility und Assurance |
| 10.1.6 | Skalierung des WAN |
| 10.1.7 | Secure Access Service Edge (SASE) |
| 10.1.8 | Anforderungen an SD-WAN |
| 11 | Klassische WAN-Technologien |
| 11.1 | WAN-Transportnetze |
| 11.1.1 | Mobilfunk-Netze |
| 11.1.2 | Das WAN aus Sicht von SD-WAN |
| 11.2 | MPLS |
| 11.2.1 | L2 und L3 Services auf Basis von MPLS |
| 11.2.2 | QoS in MPLS-Netzen |
| 11.2.3 | MPLS aus der Perspektive des SD-WAN |
| 11.3 | Internet |
| 11.3.1 | Autonome System |
| 11.3.2 | Anbindungsvarianten für Kunden-Netze |
| 11.3.3 | BGP-4 |
| 11.3.4 | Das Internet aus der SD-WAN Perspektive |
| 11.4 | Mobilfunk |
| 11.4.1 | 5G |
| 11.4.2 | Mobilfunk-Netze aus SD-WAN Perspektive |
| 11.5 | IP VPNs |
| 11.5.1 | IPSec |
| 11.5.2 | Die Verpackung im Tunnel Mode |
| 11.5.3 | Standortkopplung mit Site-to-Site-VPN |
| 11.5.4 | Dynamic Multipoint VPN (DMVPN) |
| 11.5.5 | Group Encrypted Transport (GET) VPN |
| 11.6 | Orchestrierung in klassischen WAN-Infrastrukturen |
| 12 | Architektur und Funktion des SD-WAN |
| 12.1 | Komponenten des SD-WAN |
| 12.2 | SD-WAN Controller Deployment |
| 12.2.1 | Cloud Based Controller für alle Kunden |
| 12.2.2 | On Premises |
| 12.2.3 | Cloud Hosted - Customer |
| 12.2.4 | Cloud Hosted - Vendor oder MSP |
| 12.2.5 | Redundanz des SD-WAN Controllers |
| 12.2.6 | Zugriff auf den Controller |
| 12.3 | Anbindung des SD-WAN Routers an das WAN |
| 12.3.1 | SD-WAN Router in der Customer Location |
| 12.3.2 | Anbindung an ein MPLS-Netzwerk |
| 12.3.3 | Integration in ein Campus LAN |
| 12.3.4 | Redundante Anbindung an das WAN |
| 12.3.5 | Site Redundancy |
| 12.3.6 | Onboarding des SD-WAN Routers |
| 12.4 | Routing |
| 12.4.1 | Graceful Restart |
| 12.5 | Overlay-Tunnel |
| 12.5.1 | Redundanz der Tunnel-Verbindungen |
| 12.5.2 | Topologien im SD-WAN Overlay |
| 12.5.3 | Schutz des Datenverkehrs |
| 12.5.4 | Alternative zum Tunnel: Secure Vector Routing |
| 12.6 | Application Based Routing |
| 12.6.1 | Reaktion auf Ausfälle |
| 12.6.2 | Erkennen von Applikationen |
| 12.7 | Performance Routing |
| 12.7.1 | Kriterien für das Performance Routing |
| 12.8 | Traffic Optimization |
| 12.8.1 | Optimierungen für VoIP und IPTV |
| 12.9 | QoS im SD-WAN |
| 13 | Cloud Integration und SASE |
| 13.1 | Cloud Services |
| 13.1.1 | Cloud-Nutzung |
| 13.1.2 | Public Cloud Applications - SaaS |
| 13.1.3 | Self-managed Applications in der Cloud - IaaS |
| 13.2 | Internet Access im SD-WAN |
| 13.2.1 | Direct Internet Access zu SaaS |
| 13.2.2 | Optimierung für Public Cloud Applications |
| 13.3 | Integration von Cloud Infrastrukturen |
| 13.3.1 | Optimierung mit Transit-Netzen |
| 13.3.2 | Integration von Collocations |
| 13.4 | Secure Access Service Edge (SASE) |
| 13.4.1 | Anbindung an SSE |
| 13.4.2 | Security Services im SSE |
| 13.4.3 | SASE Herstellerübersicht |
| 14 | Migration zu SD-WAN |
| 14.1 | Planerische Aspekte |
| 15 | SD-WAN-Hersteller |
| 15.1 | SD-WAN Marktüberblick |
| 15.1.1 | Hersteller-Auswahl |
| 15.2 | Hersteller-Übersicht |
| 15.2.1 | Cisco SD-WAN powered by Viptela |
| 15.2.2 | Cisco SD-WAN powered by Meraki |
| 15.2.3 | VMware |
| 15.2.4 | Fortinet Secure SD-WAN |
| 15.2.5 | Versa Networks |
| 15.2.6 | Citrix SD-WAN |
| 15.2.7 | HPE Aruba EdgeConnect (SilverPeak) |
| 15.2.8 | Palo Alto: Prisma SD-WAN |
| 15.2.9 | Aryaka |
| 15.2.10 | Juniper Contrail SD-WAN und 128T |
| 15.2.11 | Synopse der Hersteller-Lösungen |
| 16 | Zukunft des SD-WAN |
| 16.1 | Evolution des SD-WAN |
| 16.1.1 | Evolution zu SASE |
| 16.1.2 | Die Cloud als SD-WAN Backbone |
| 16.2 | MEF-Standards für SD-WAN |
| 16.2.1 | MEF 70.1 |
| 16.2.2 | SD-WAN Konzept nach MEF 70 |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
