Course outline

Gigamon® Visibility Fabric™ Design

Categories: Gigamon, Guaranteed To Run™


Duration: 2 Days

In this 2-day hands-on course you will learn the essential information and develop the key skills to enable you to design a Gigamon®, Visibility Fabric&trade, deployment. Multiple discussion labs support the learning objectives and allow you to practice the lessons learned in class.

You will learn common terminology to describe the basic challenges and architectures for security solutions. The basic challenges and architectures presented for Cloud solutions (Private, Public and Hybrid) will help you to prepare for modern deployments. You will understand the basic challenges and architectures for utilizing analytical solutions to ensure your designs and deployments are achieving the desired goals.

The Visibility Fabric Design labs will assist you in understanding various networking architectures where the Gigamon Visibility Fabric&trade, can dramatically improve security and visibility. You will learn the most important design considerations given essential requirements and existing network infrastructure. During these labs, you will discuss the different Gigamon technologies that can be used to achieve specific goals.

  • Describe today's security and performance monitoring challenges
  • Learn to architect solutions that counter security threats
  • Understand the important challenges of deploying Gigamon Visibility Fabric
  • Prepare for multi-vendor solution deployments
  • Basic understanding of networking concepts
  • Familiarity with network security and monitoring tools
  • Conversant with
  • In-line and out-of-band security architectures
  • Service Provider terminology and architectures (2G, 3G, 4G, 5G, LTE)
  • Private and public cloud architectures
  • In-line and out-of-band Enterprise monitoring architectures.
  • Solution Architects
  • Pre-Sales Engineers
  • Security Professionals

Module 1: Architecting for Security

  • Understanding Security Threats
  • Attack Evolution
  • Challenges in Detecting Threats
  • Basic Security Architectural Concepts

Module 2: Overview of Gigamon Secure Platform

  • Architecture
  • Components
  • Deploying for
    • Inline Tools
    • Out-of-band Tools
    • Redundancy (Tool Groups, N+1)
    • Asymmetric Routing
  • Using NetFlow (Metadata)
  • Cloud Security Architectures
    • VMware, OpenStack, and AWS
    • Private, Public, Hybrid
  • Examples
    • Simple Inline Tool
    • Inline and Out-of-Band
    • Redundancy

Module 3: Architectural Challenges Monitoring in Service Provider Networks

  • Basic Service Provider Network&mdash,Diversity of Topologies
  • Internal Operations
  • Unified Tool Rail Concept
  • Detecting and Responding to
    • Performance Degradation
    • Outages
    • Protecting Customer Information and Metrics
    • Analytics/Trending
  • Deploying Gigamon Visibility Fabric
    • In Conjunction with Different Technologies (3G, 4G, LTE, 5G)
    • For Customer Experience
    • For Monitoring Internal Operations
    • For Analytics/Trending
  • Examples
    • Comparison of 3G, 4G, LTE, 5G
    • CE Tools
    • Clustering

Module 4: Architecting for the Cloud

  • Basic Cloud Architectures (VMware, OpenStack, AWS)
  • Virtual Network Basics
  • ISDN and NFV
  • Integration with the Enterprise
  • Deploying
    • VMware
      • Basic Virtual Networking
      • NSX and SDDC
    • OpenStack
      • Monitor from Within (Agent Based)
    • Public Clouds&mdash,AWS
    • Asymmetric Routing
  • Using NetFlow (Metadata)
  • Cloud Security Architectures (VMware, OpenStack, AWS)
  • Examples
    • Private Cloud
    • Public Cloud
    • Hybrid

Module 5: Architecting for Analytics

  • Challenges
    • Performance
    • Security Challenges
    • Architectural&mdash,Monitoring Tools (Moore',s Law)
  • Understanding Traffic Sources (SPAN vs. TAP)
  • Basic Monitoring Challenges (dropping and duplicate packets)
  • Deploying Gigamon Visibility Fabric in a Clustered Deployment
    • Scaling to Accommodate Traffic Volume
      • Load Balancing
      • Filtering
      • Centralizing Tools
      • Remote/Branch office
      • Tool Rails
      • New Company Acquisition
      • Virtual to Physical
      • Lights Out Operation
    • Examples
      • Multi-deployments
      • Opex/Capex Efficiency through Centralization
    • Lab 1: Security Architecture for Internet Edge and Remote Locations
      • The goal of this activity is to design a security solution based on customer-specific requirements and Gigamon best practices for the Internet segment. This lab challenges you to increase the overall security visibility and reliability of the Internet edge segment by using Gigamon Visibility Fabric&trade,.
    • Lab 2: Security Architecture for Data Center
      • You will create and present a recommended architecture and describe how Gigamon technologies and solutions are being used in the Data Center environment. In this lab you will face specific Data Center challenges and your goal is to describe and select an appropriate Gigamon solution.
    • Lab 3: Customer Experience in Service Provider Environment
      • Demonstrate your understanding of how Gigamon technologies are deployed in a Service Provider environment. This lab challenges you to meet Service Provider requirements such as monitoring subscriber&rsquo,s traffic and intergradation with external analytics, billing, and other tools.
    • Lab 4: Analytics and Trending in Service Provider Environment
      • Describe how Gigamon technologies can help Analytics tools to be more efficient, and how to choose appropriate subscriber aware features for a Service Provider environment
    • Lab 5: Architecture for Public Cloud
      • Present recent examples of how Gigamon technologies and solutions are being used in public and hybrid cloud environments, and to describe important design considerations that should be reviewed before deploying a solution.
    • Lab 6: Architecture for Private Cloud
      • Deploy Gigamon technologies in two widely used private cloud environments: VMware and OpenStack. You will describe the important design considerations that should be reviewed before deploying a solution.
    • Lab 7: Enterprise Analytics in a Multi-Tool Environment
      • The goal of this activity is to present a recommended architecture and describe how Gigamon technologies and solutions are being used in the Enterprise network for application and network performance monitoring as well as for customer experience management.
    • Lab 8: Basic Architecture for Efficiency
      • Present a recommended architecture and describe how Gigamon technologies and centralized monitoring tools can decrease Capex and Opex for a company.

Feel free to contact us, if you want to know the price and location of this course. A Digital Revolver representative will contact you shortly to help you with your inquiry.
Please fill out the form below

  • Guaranteed to Run™. This ensures you will attend the instructor led class or live online class you want as scheduled without any disruptive cancellations*. You book the training you need, get back to focusing on your job and are sure your training requirements will be met saving time, money and ensuring peace of mind.
  • This schedule icon the schedule indicates that this date/time will be conducted as Instructor Led Training (ILT) or a Virtual Instructor Led Training (VILT) depending on the indicated class availablity.
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial