Don Troshynski, CTO, Global Sales, Juniper Networks

Top SD-WAN: Competitive Webinar

SD-WAN
Don Troshynski Headshot
Text says, "Top SD-WAN. I Feel the Need for Speed," along with photos of the hosts Don Troshynski and Tarek Radwan

Feel the need for speed?

Stay off the sidelines by choosing the right SD-WAN solution for your network. Fly with us through this webinar as we demonstrate why AI-driven SD-WAN powered by Juniper’s Session Smart™ Routing is the “top gun” of the market. Discover all the ways AI-driven SD-WAN beats the competition—all while brushing up on your Top Gun trivia.

Show more

You’ll learn

  • Top five reasons Juniper’s SD-WAN is the best on the market

  • Why competitors’ legacy SD-WAN solutions can’t keep up

  • Six reasons why tunnels slow you down

Who is this for?

Network Professionals Security Professionals

Host

Don Troshynski Headshot
Don Troshynski
CTO, Global Sales, Juniper Networks

Guest speakers

Tarek Radwan Headshot
Tarek Radwan
Product Marketing, Juniper Networks

Resources

Transcript

0:11 do you feel the need for speed well you've come to the right place hello

0:17 pilots and welcome to top sd-wan where we'll be comparing juniper's sd-wan to other solutions out there

0:24 do you want to know who's the best [Music] well first i want to introduce donald

0:30 truschinsky your instructor callsign cavalry don what's your role in this dog fight

0:38 i am don truscinski call sign cavalry join you today as cto of global sales

0:44 from 128 technology now with juniper networks uh we're thrilled to be with you here today as juniper to share why

0:52 we are the top gun the top sd-wan in the market i've been piloting networks for many of

0:59 the top world's top networks uh networkers like yourselves today i've been piloting

1:06 for over 30 years now since top gun was even made i believe we're entering an era of true

1:12 innovation that networking has not seen in about 20 years uh we're going to talk

1:19 about our tunnel free sd-wan solution if you've lost that loving feeling for

1:24 cisco hewlett-packard vmware any of these other legacy 61 solutions i invite

1:31 you to deploy juniper today with our ai driven enterprise networking we've got the

1:37 world's leading solutions that we will tell you about nice don and i'm tarik radwan i'm lead

1:44 product marketing manager here at juniper and my call sign is duck and i'll be your rao don your radar

1:51 intercept officer and you know with that this is kind of fun we want to have a lot of fun with

1:57 you today um and i'm thinking we just kind of jump in um

2:02 one of the things that um that we'll do is we'll try to kind of explain to you why we think our solution

2:10 our suv solution is the best and so we're going to go over top five

2:15 reasons why juniper sd-wan leaves the rest in the dust and as we're doing this again we're

2:21 going to try to have a little fun so we'll insert some some top gun trivia hopefully to keep you engaged

2:27 and so the first thing is around air superiority why is session based technology from uh

2:34 from juniper way better than the alternative and what is the alternative don maybe you can kind of talk us

2:40 through that yeah so you know we work with a lot of customers and

2:46 one theme is always true there are constraints on bandwidth somewhere in the network

2:53 and you know you look at an lte you know talk about air superiority right lte satcom you know but even broadband uh

3:00 any of the mpls networks that they are always to some degree bandwidth constrained

3:06 and so by having a session based router and a session based sd-wan solution you

3:13 can eliminate tunnels save that bandwidth while still performing the steering uh and context

3:21 aware networking uh that you need to accomplish your mission all right so let's talk about how that

3:27 works now we've got under the hood in the juniper ssr

3:32 we truly have a session oriented uh metadata based routing mechanism so when

3:38 a packet comes in we look at the very first packet we don't have that

3:44 session signature in the fast path we're going to look that up we're going

3:49 to send that off to uh we're going to we're going to escalate that to uh to the general and we're going to say all

3:54 right does this session have permission to communicate across the network if so

4:01 we'll allow that per policy will now pop the source and desk address

4:07 put that into metadata no longer are you tunneling every single repetitive signature of a

4:15 packet across your network we send the metadata one time and one time only

4:21 to establish the session across any given link in your network

4:26 we then steer traffic through waypoints that could be a network of waypoints across any network any transport

4:33 we evaluate the topology for quality security

4:39 we choose a vector based on performance where does that session need to go right now it's not where the tunnel has

4:45 already been it's where that session needs to go right now across the entire fabric

4:51 and we can route that end to end through a network of ssrs to achieve sd-wan

4:57 tunnel-free and so that's true innovation in routing that we have not seen in 20 years and

5:05 that is clearly why we number one reason why we are the top sd-wan top gun on the market

5:13 nice and maybe you could talk about how it's a bit different and how it kind of helps you

5:19 um you know as as the network operators out there to make your life easier

5:25 well so you know the complexity of of deploying a topology right so trying to bring up a network of tunnels uh

5:32 choosing a mesh and hubs and spokes all of those challenges can be very very

5:38 simplified when you have a network of peering routers so we deploy nodes they learn about each

5:45 other and create the topology for you and then as you route sessions you route

5:52 them on demand you can go multiple hops through a network of ssrs and uh and

5:59 very easily deploy the topology of your choice another way that we you know simplify

6:05 operations um is to put a named data model around the applications uh sure we understand

6:11 office 365 and twitter's and the netflix but we also make it extremely easy to

6:17 put words around the traffic that your business most cares about right you know what is mission critical

6:24 for your network why can't you describe your business policy in terms of what's

6:30 important to you and so we take all the access control lists the ip addressing and we we can uh

6:37 use instead a name data model that allows you to see the traffic in the

6:42 words that you care about uh gives you uniform global service policy makes your network uh and your sd-wan so

6:50 much easier to operate you can see exactly what's going on

6:55 and do you have any uh interesting customer stories to share where this has actually helped them

7:01 well absolutely all of our customers are leveraging the tunnel free approach and all of our customers leverage a name

7:07 data model um i i heard a funny story about a competitor where uh you know

7:13 they they said oh you know sd-wan has become really popular so what we did was we named renamed load balancing

7:20 in our solution to become sd-wan well let me tell you load balancing is not an

7:26 sd-wan uh session-aware routing and tunnel free routing is zesty when sdwin

7:31 3.0 nice i think uh it's time for a little fun

7:38 let's let's do our first trivia and one of the things and i think i feel like just putting on these glasses from

7:44 time to time so here's a question for all of you and this is a poll

7:50 so what is the name of the base in top gun the military base that's used

7:56 there give you guys like uh say 10 seconds to respond

8:06 and by the way these are all bases in california so that's a hint it actually happens in california

8:16 okay let's see what the results look like ah you guys uh mostly got it that's

8:21 right miramar so in the movie you boys are going to miramar

8:26 excellent let's move on to the next

8:31 the next point which is around breakthrough economics so we talked about sessions we talked

8:38 about how they're different and how they they allow you to do things that are different are there any other

8:44 um you know interesting things that kind of come out what are the benefits that that happen because of sessions

8:51 well tart nobody likes to pay tax i mean that's that's one thing we can all agree upon right and

8:58 you know i i i do meet a lot of customers that don't fully appreciate the difference between sort of that

9:04 dirty little secret of tunnels and you know the tunnel free approach that we've taken

9:10 you know the reality is no matter how you build your tunnel you know be it ipsec or vxlan or gre

9:17 uh you're going to be putting stacks of headers on each packet and yeah you might have some long

9:23 packets here and there and and the percentage of overhead is down but all of those need to be acknowledged the acknowledgements have to be funneled

9:30 it really adds up and it's taxed and it just happens to be about 30 percent on average in fact we put that into our

9:37 user interface so that we can show you really what your tax that you're paying is um you know if

9:42 you're going from client to cloud all the way from client to cloud you will have a bandwidth

9:48 cost associated with this and uh you know when we're talking about breakthrough economics you know a big

9:55 part of that is the bandwidth reduction the ability to easily steer traffic uh

10:00 to a data center when necessary uh potentially over your choice of circuit uh eliminating back call

10:07 that can save you cost obviously a huge aspect is to be able to

10:12 leverage all of the bandwidth in the network so if you're routing sessions instead of tunnels you can choose on an

10:19 application by application basis how that lays out in your network according to the performance and sla that you need

10:26 and so the ability to truly leverage you know not just again a apparel two

10:32 parallel tunnels but any path in the network uh for multipath is is critical

10:38 and then of course to be able to control the traffic and so um i don't want to pay the tax of maybe a

10:45 user going out to um you know a random internet application and competing with my business applications so the ability

10:52 to police those sessions right being aware of them in the first place the ability to then assign bandwidth

10:58 prioritization according to sessions and applications is critical and then of course to scale

11:05 so uh your complexity creates cost and so the ability to scale the

11:12 head end very simply the ability to scale the control plane

11:18 uh essentially the conductor uh the management solution uh to thousands of

11:23 nodes uh is critical it will save you time it'll save you money uh and our

11:29 competitors just just don't fly that way excellent

11:34 um any interesting stories uh maybe in terms of head end cost savings at our

11:40 customers or something to share there yeah we had a very large uh pharmacy uh that you know

11:48 looked at the alternatives in the market uh they looked at those obviously tunnel-based solutions uh they required

11:55 a very complicated head end uh stacked up uh they did the math they looked at uh

12:01 the amount of bandwidth they were putting on to their network i realized it was about five terabits per day um

12:07 granted it's 10 000 sites uh but uh five terabits per day uh you know

12:13 that's a huge economic burden uh that they didn't that they didn't uh appreciate right and so you know again i

12:20 call it you know kind of the dirty little secret of of your competing sd-wan is that they're stacking funnels

12:26 uh that cost you money this customer realized it and they're happily deploying thousands of ssrs

12:33 excellent that's great let's move on to another fun little poll

12:39 and so for this one let's see what it says uh which military branch

12:45 does the top gun organization belong to in the movie trick question warning for question

12:51 warning yeah

12:56 oh and as you guys respond to this poll one thing i forgot to mention at the top is that we are raffling away

13:03 a nice pair of ray-ban sunglasses to one lucky winner at the end of this

13:08 webinar so stay tuned for that please and let's

13:15 let's see how you guys responded ah

13:21 i see uh navy um air force is second marines and army

13:27 you know that's that's interesting um so in fact the answer is navy yeah

13:34 yeah that's right so miramar belonged to the navy during the making of top gun and uh the marines

13:41 took it over they stormed the uh the base and took it over in 1996 so

13:46 that's a that's a trick question excellent yeah that's that's that's neat

13:51 so in terms of now let's kind of switch gears and talk about

13:57 the dog fight we're all experiencing with protecting our um

14:03 you know our our organizations from from hackers and from bad actors out there can you talk a

14:10 little bit about you know the bulletproof security that because of the session design and svr

14:17 and some of the things you talked about how that actually improves security like significantly

14:24 well when your sd-wan solution is built with security in mind from the ground up

14:30 you don't have to uh add it on bolt it on a tunnel to it

14:35 tunnel from it right and so you know that was a huge part of the thinking at 128 technology

14:41 right now juniper networks in the building of the solution uh so the ability to

14:47 once you've got uh the session level intelligence in the router itself right so no longer do we have a stateless

14:53 packet forwarder with security kind of bolted on top what we have is a router that now understands uh every session

15:00 going through it and you can put into place deny by access uh deny by default access policy uh the hop i hop

15:08 authentication aspect is also quite interesting you want to you want a huge uh guard out front of the base right so

15:15 the ability to to now limit your peering and your scope of uh or really your

15:21 surface area uh that you can access the sd-wan um you know ensures security out

15:27 of the gate right and so uh we do hop-by-hop authentication when we have that metadata tag in there we can look

15:34 at the encrypted metadata understand uh even authenticate that that packet

15:39 understand whether it's a valid even initial packet to establish this session so you've got an extra layer of security

15:46 at the front door and then you've got the ability to adaptively encrypt and

15:52 again this is just another way we just blow away the competition uh in our ability to adaptively cr encrypt but

15:59 tunnel free and that adaptively encrypts so remember we've got that metadata

16:04 signature that can tell you what the context of the session is right what segment it came from who's the tenant

16:10 who's the service it's trying to reach and should that be encrypted should it be encrypted if it's already

16:17 encrypted so adaptive encryption uh is helps you with performance it also helps

16:22 you with security and then when you you're setting up sessions directionally so i come into the fabric at the ingress

16:29 think of it almost like an ingress zone at the edge of the fabric now i can carry context end to end throughout that

16:36 fabric and when i egress you could almost think of that as an egress zone out of the other end of the fabric so

16:43 you've got a session stateful distributed firewall built into the sd-wan solution from the ground up if

16:50 your current sd-wan or your your competitive thought is is that uh you know you're

16:56 going to deploy sd-wan and then pile security on top why not have it be part of the solution from the ground up have

17:03 that be part of your policy model your data model uh it's just so critical uh

17:08 you know just go ahead and search for uh uh security issues with sd-wan and you'll

17:14 find companies out there where security was truly an afterthought to their sd-wan

17:20 and that's just another way that we are top gun in this market

17:25 can you talk a little bit about it oh sorry yes

17:30 maybe talk a little bit about route directionality in terms of securing like what's what's

17:37 what's special about that because i get really excited about this one so

17:42 just because i have access to the cloud doesn't mean my enterprise needs to expose its footprint to the cloud just

17:49 to have kind of connectivity right so if you're setting up your routing your sd-wan in terms of vectors right we're

17:56 routing with vectors why wasn't routing always sort of done in term vectors

18:01 we had to add security as an afterthought if i can define a policy that is different between me and the

18:07 cloud and maybe the cloud and my enterprise you have you know true security and it's a true uh firewall

18:14 uh when we set up the session we set up both the forward and reverse direction at the same time

18:20 we can convey the context to the next hop so they can set up the forward and direction and reverse direction at the

18:26 name is at the same time and so essentially that is a true stateful uh distributed stateful uh

18:33 firewall and you gotta check yourself so right so you look at all these logos here uh you

18:38 know we spend a lot of time evaluating our own security uh you know we talk about

18:45 customers that that appreciate this uh we work with the us air force uh the u.s

18:50 army uh they appreciate our security from the ground up in fact they love the fact that they got metadata when they

18:56 send a packet out to a public network uh off off net shall we say uh they they uh

19:04 they tag that with metadata and uh ensure that that front door is is locked um they're also a great partner

19:11 of ours uh microsoft's a great partner of ours um in evaluating the security of

19:16 the solution and and so it's you know if your vendor is not checking themselves

19:22 uh constantly also uh being checked uh by their customer base around security

19:28 then i think you uh you you may be at risk for a big crash

19:34 excellent that's great let's let's move on to our next uh trivia question

19:40 um let's see if i can read these ah which branch of the military is portrayed in top gun

19:51 i think it was space force right i think the space force

19:57 you know they were up in the sky right that's right were they inverted

20:02 i think at one point they were inverted

20:10 and let's look at your responses let's see what you guys say air force that's a pretty big one 39

20:18 percent of you and uh the the number one response is navy in fact it is navy navy is the uh

20:26 is the uh the branch of the military that's that's shown in top gun excellent

20:31 so in terms of now sort of pushing against the barrier like you

20:37 know we blow past the sound barrier and you know we're able to provide this

20:44 this edge of the envelope type performance maybe you can talk a little bit about

20:50 sort of the results of that like all this you know the capabilities combined with the security that's already built

20:56 in how does that help to to push the the performance of the of the sd-wan

21:03 yeah so you know i i tell customers just take a look just try it out uh you put

21:09 it on the network and see how it performs um and here's here's a chart uh of a

21:15 customer who did just that they deployed the technology in place of an ipsec tunnel based solution

21:23 i think it had some extra stack tunnels in there as well like a dmvpn or something like that and

21:29 and what happens is you know if you've ever tried to troubleshoot a tunnel um and understand whether it's up or down

21:36 um the establishment time uh if it is uh down and needs to be re-established um

21:41 there's a just a lot of legacy negotiation in there um and so what happened in this

21:47 particular customers network was that they they saw you know bouncing of

21:52 tunnels they saw extra latency due to inefficient routing and you know that

21:58 caused application uh performance challenges you may guess which day they deployed uh

22:04 the ssr that would be day 15 and it was interesting because

22:10 it both uh influenced you know not only the availability of the network not only

22:15 the uptime uh from a session and application basis uh also lowered the latency improve the network performance

22:22 and so you know again i i think it's important to uh you know there's there's a lot of mechanisms

22:29 out there in the network um you know where they claim to improve performance but then they just don't mention the

22:34 fact that there's a tunnel headers on there um and establishing tunnels sometimes dynamically and and that just

22:40 takes a lot of work um make creates a lot of complexity and this visually

22:45 shows you what the end result is yeah and i hear that like the users at

22:52 the site they're like wow the applications are running great everything's running so smoothly

22:58 now so you know it actually does drive the user experience

23:03 but not only that i feel like also the the headache of tunnels and the overhead

23:09 of tunnels prevent tunnels from providing connection to some interesting sites right

23:18 exactly inefficient routing uh latency i mean so we're just going to lower latency it's going to be a better

23:23 experience you know that application download um especially again over um you know the

23:29 variety of links we expect to be part of an sd-wan uh you know it's a real payoff

23:36 another thing you know when we're setting up that session uh you know we drop that down into fast path uh once

23:43 that metadata has been conveyed and our forwarding plane becomes extremely

23:48 simple so if you look at um you know essentially the the

23:53 the router will begin to act more like a nat gateway to and from waypoint addresses and and give all of that

24:01 bandwidth back to the application so that can completely eliminate fragmentation if you don't have

24:07 encryption and and especially even with the adaptive encryption approach you can still run encrypted uh traffic

24:14 completely eliminate fragmentation which again can create latency can uh you know can

24:20 just simply cause connectivity issues in the network and so again i urge you to just take a look

24:26 and and try it out excellent let's move on to our next poll question

24:32 or actually do you want to talk a little bit about uh tunnels yeah for sure i mean uh you know there

24:40 they are one a one-lane highway right and so i talk a lot about entropy um trying to

24:46 achieve entropy uh you know if you look back again over 30 years you know there's always been sort of this micro

24:52 flow performance in networks you know you can you can divide up packets gotta eventually send them over

24:59 a circuit in a path and so whatever that microflow performance is now your tunnel

25:04 is going to be subject to it and you know and the more entropy you have

25:10 in this in your sd-wan the better it will overall perform even through the

25:16 service provider network through the internet right so you don't want your tunnel bunched with a kind of a noisy neighbor

25:23 if you will and so to to relieve yourself of that kind of one lane highway uh can can lead

25:29 to application performance improvements uh you know again that just the congestion that goes along with that

25:36 you know i talked a little bit about the fragmentation uh you know that that uh you know it's a

25:41 huge headache i think for a lot of network operators um so the folks that uh you know see this approach uh you

25:48 know to being truly tunnel free and potentially to be able to use the entire length of the packet

25:54 we certainly disguise uh you know if there is any um you know mismatch and packet size we uh can perform uh pack

26:01 and fragmentation is needed for example if you've got encryption overhead uh but you really you know the goal is to

26:07 simplify um and you know in tunnels do not achieve that goal uh you know if you look at uh even

26:13 setting up a tunnel maybe i wanna you know move traffic over to lte or on to the air

26:20 last thing you wanna do is wait and uh you know provide a user at a checkout counter or um even a you know a navy

26:27 pilot some kind of a delay in uh transferring traffic over a new path

26:32 right and so you're always on right i just simply send a session with metadata that's been encrypted and uh

26:39 opens the front door with the key then you know i've got none of that latency and setup

26:44 and so uh you know again when we set up also set up that session end to end

26:50 uh you know i've even heard uh customers trying to leverage tunnels maybe go to a low balancing mode and the forward

26:55 packets will go one direction reverse in another uh you know again we're symmetric so we're always setting up

27:01 that session symmetrically and we can guarantee the reverse path when we move that uh session to a new path we can

27:08 remove and uh the forward and reverse direction at the same time and that applies even in a multi-hop and so

27:16 uh you know you are absolutely eliminating bottlenecks uh in the network and giving your network more

27:23 freedom to leverage the available bandwidth competing solutions and if you say the

27:29 market's got 40 sd-wan solutions 39 of them are going to be tunneled and um and

27:34 so we are top gun we are top sd-wan in this market because of this

27:40 excellent let's add one more uh

27:45 question here so what song does goose play on the piano this was uh one of the scenes uh

27:52 where they're they're enjoying their time was it you've lost that loving feeling was it

27:59 tutti frutti great balls of fire or johnny be good

28:06 this is tough this is maybe not maybe not for the

28:12 folks with a good memory but i don't know about you don but i must have watched top gun on vhs

28:20 like 57 times at least growing up

28:27 and the answer yep you guys you got it great balls of fire yeah goodness great oh my gosh

28:34 and now so how do we how do we um now let's tackle the the last um area

28:42 why we're where we're the best and that's around the aiops how do we

28:47 bring artificial intelligence and artificial intelligence to the operations to make

28:53 life easier and kind of like the bigger picture now for folks that have not looked at the

28:59 juniper enterprise solutions these days uh we dominate uh we dominate not only

29:05 through tunnel free sd-wan but you know true ai driven operations

29:11 so you know this really originated uh with the miss solution and marvis and

29:17 the miss cloud now the notion was to say all right there's so much data here we've got

29:22 wi-fi signals we've got i don't know dhcp servers dns servers out there that all have to function in

29:29 harmony and you know there's so many places to look when there's a challenge in the

29:35 network right and the networking folks we just tend to be you know kind of that center of reconnaissance right if you

29:41 will uh you know hey what's going on because we've got visibility into the applications we've got visibility into

29:47 the dns the dhcp we've got visibility into it all but why does that mean you know that we have to as human beings

29:54 always spend time troubleshooting why can't we have an ai engine that takes the data

30:01 from a wi-fi edge into an intelligent switching platform a

30:07 wired lan potentially through additional security tools into an sd-wan edge and then bring the

30:14 data together about how all the tools in the toolbox are performing and then

30:20 process that through an ai engine um you know this is 2021 and and uh one

30:25 of my funny quotes from a customer was uh this is the year 2021 and nobody can

30:32 tell me where my packs are right and you know and to go through that as manual process uh can be unfortunately rigorous

30:40 so by bringing marvis and bringing juniper and missed ai into your network into

30:45 your sd-wan solution uh you can now begin to uh you know free yourself uh

30:53 leverage ai to understand which components potentially which applications maybe which links

30:59 uh you know which airwaves are working well and which are not and and that's

31:04 what it's all about and that's why we're just kind of blown away the competition when it comes to network intelligence

31:10 uh we want to be proactive we want to understand what's happening potentially tasks that you may need to

31:17 pay attention to and there's no reason in the year 2021 that you shouldn't be able to find your

31:22 traffic and so we're optimizing it all the way from client to cloud

31:28 yeah it's it's uh i like the way you phrase that the the one thing that people

31:34 are looking for is to save time and if you can allow the ai to take over some of these rote tasks

31:42 you know it then is able to find that needle in a haystack much faster than you could and so answering a

31:49 question like what this slide says like why is my zoom call breaking up we've all experienced this

31:54 because sometimes it's like the number one complaint that we hear you know what's wrong with bob's video

31:59 call yesterday is it the wireless is it the wired you know is it is it something on the on the

32:06 application server right like where where is this problem originating

32:12 uh and being able to correlate across all these areas is like the holy grail

32:18 uh and so we're able to to bring that to market we actually have this available

32:23 uh and so it's it's a it's pretty impressive and i don't think anybody has anything on us when it comes to

32:30 artificial intelligence this is true you know if the sd-wan

32:35 solution truly understands sessions it can look at those sessions and say hey am i seeing tcp re-transmissions

32:42 uh which servers am i seeing tcp re-transmissions does that correlate back to a link in my

32:49 network or does that really correlate back to a service or a server in my network

32:54 and so with all the fine-grained visibility you get with the session aware sd-wan you can now very quickly uh

33:01 troubleshoot whether it is links uh servers services uh is it taking a long

33:07 time to set up a tcp connection to a particular server or set of servers

33:12 this is uh this is critical information you know any of us that have

33:17 spent a lot of time looking at uh you know troubleshooting and packet captures uh you know understand that we

33:25 can benefit a lot from an ai engine and that ai engine

33:31 should reside in the cloud and it does reside in the miss cloud we can benefit a lot from that doing the

33:37 processing uh you know again when you've got uh you know kind of a console you know your

33:42 cockpit uh you know is doing a lot of work for you um you know think about flight you know it's moved from uh

33:48 you know a single stick to uh tons of ai that you know helps you fly the aircraft

33:54 uh you know that's what we set out to achieve you know with your enterprise solution and we're truly innovating i mean

34:00 networking has not seen this kind of innovation uh in years and so i'm thrilled i'm super excited to be part of

34:06 this yeah and just a quick trivia in terms of the name marvis it actually uh

34:12 the founders um at mist they they chose the name marvis a sort of a playoff of

34:19 jarvis from you know the um the ai in um in the suit that iron man

34:25 wore so uh again you know the idea is that you have the help there marvis is there for you

34:31 um i think don this was excellent i see we have tons of questions that have come in

34:37 do you want to spend like uh uh a couple of minutes here maybe picking out a couple of these that um

34:43 we might do some adjustments yeah let's do what we can and uh you know

34:48 we've got time to cover them let's do it if we have to uh delay the release of top gun two and uh

34:56 yeah uh let's see what's a good question here do i need an ip public

35:03 a public ip for the conductor oh no yeah so that's um

35:09 that's one of the things that we just yeah we want to keep in the solution right is the ability to run that public

35:15 and private you can certainly run the conductor completely on a

35:20 private network with complete insulation from you know the internet obviously i mentioned air force and army

35:27 they have strict requirements and we are we are not attached to public networks uh you know

35:33 for uh for uh purposes of orchestration so um you know that's uh that's a key

35:38 aspect a key characteristic that we'd like to keep we obviously want to leverage public

35:44 cloud for the customers that uh that can do that and um and make it super easy to

35:49 deploy but we can run all private today here's another interesting question uh

35:55 very technical does the solution use fec feck

36:01 yeah so you know we have what i call you know kind of a one-to-one effect uh today

36:08 and um and so forth correction being right i want to get to the other end and correct any errors packet loss uh that

36:14 may have occurred so uh in fact i just talked to a customer yesterday um you know they don't

36:20 necessarily want to have to tune this um they're like all right for certain services maybe it's a voice service or

36:26 whatever's critical to my business if i could just duplicate packets across multiple links

36:31 i'm good to go and what i call uh one to one fec obviously we're doing a lot of work to

36:37 optimize that i've got the session intelligence and the ability in software based

36:42 uh our software-based solution uh do um to to uh to optimize and manage that on

36:47 a per application basis but we do support uh what i'll call one-to-one effect today

36:55 excellent a question about hardware uh what what are sort of the the requirements uh in terms of hardware to

37:02 to run it yeah so you know this is another thing that i've i've really wanted to uh to

37:09 keep as part of the solution is uh you know the flexibility uh to deploy on

37:14 your choice of hardware and that's not easy to do uh we spend a ton of time certifying platforms uh call

37:22 it certified plus you know we definitely would like to steer you towards the certified plus

37:27 those are going to be tested every release every patch and uh you know you know you're running on uh you know

37:33 certified hardware um that could even be hardware uh you know it was part of the juniper portfolio we want to take

37:40 advantage of that but uh when it comes to hardware uh we'll give you a choice anywhere from uh i've got a little uh

37:46 300 box on my desk right here that's actually wired in so i i can't pull it over but um anywhere from that small

37:53 unit all the way up to uh you know the largest of servers um in which we can run uh we've even hit 100

38:00 gig speeds because of the efficiency of the solution on some of the high-end hardware so uh you know we really want

38:07 to um you know to give you the choice and work with you on that

38:13 sort of a related question what about the nfx is there something interesting happening

38:19 there yeah absolutely so the nfx you know think of a unified cpe platform where i

38:25 want to run a lot of applications right so those could be juniper applications they could be your own homegrown could

38:30 be distribution could be file management whatever you'd like to do in the branch office um the nfx is an excellent

38:37 platform for that the ssr runs on it and you know continue to optimize

38:45 the way that runs on it but we made a lot of progress fast and um we support the

38:51 ssr on juniper hardware today great

38:56 it's actually another question on the integration that we have so far between the ssr and uh mist

39:04 can we talk a little bit about the integration so it's a little forward-looking um so um you know we

39:10 expect to release this to the masses uh later uh this year um but you know i've

39:17 never seen our team kind of rally around a concept you know this is this is one of the things when we when we looked at

39:22 combining forces between mist and uh you know all the juniper the ex switching and and the 128 technology ssr

39:30 uh you know it was clear that uh you know the missed ai cloud was a destination for a lot of this session

39:36 intelligence data right so uh telemetry about the network and we have tons of telemetry right on the

39:43 platform today there's like 800 stats you can go and and view you can do that through a single pane of glass apis with

39:50 high performance but the missed ai engine is absolutely the destination for that data

39:56 so we've got a bunch of systems feeding it today uh so that's how quickly we uh

40:01 went down that path uh you know in the great tradition of releasing reliable software you know we're going to do a

40:07 lot of testing and make sure that that's all ready to go and get it in your hands a little bit

40:13 later this year if you're interested in taking a look don't hesitate to reach out and we'll

40:18 give you a glimpse excellent we are getting a lot of questions

40:25 let's see anything look uh interesting to you don

40:33 um so thoughts on integrating with srx i mean it's a piece of cake we're all standards based right and um you know

40:40 the srx does have some cool tools in the toolbox uh as i say um i actually am

40:47 running through both the ssr and the srx talking into talking to you today um

40:53 service change uh in a very easy to deploy configuration um you know obviously uh you know juniper has had a

41:00 ton of great technology with junos and uh and uh and so these are easy to integrate if you find that you've got

41:06 some tools in the srx toolbox you want to combine the ssr that's uh

41:12 that can be done today excellent you know don i'm thinking we will

41:18 probably have to follow up with a lot of you folks i mean there are a lot of good questions coming in and we'll definitely

41:24 follow up directly with you um after after the event after this webinar

41:30 um any other parting thoughts don't

41:35 well i just really appreciate folks that took the time to join us today uh hopefully we hit on the high points uh

41:41 there are a lot of details here as i scroll through the questions uh you know it's uh you know the amount of uh data

41:48 in or you know bits in the metadata you know all these questions we'd love to jump on a call and drill down in um the

41:55 metadata size is based on the you know the words that you choose actually for the applications and

42:01 networks so uh maybe 100 bytes per session total um you know across the

42:06 entire network so um you know what you'll find is you know the most optimal i call it the most efficiently

42:12 architected sd-wan solution out there uh and we've got a tonic customers with uh

42:18 you know great ideas and you know deploying us in incredibly uh interesting ways

42:24 so sometimes we say hey you know give us your your toughest problem uh a networking problem and we'll help you

42:30 solve it uh we've got the tools in the toolbox and uh we want to be there with you flying for

42:36 the next 10 years using ai ops awesome thank you so much don thank you

42:41 for your time on this and we thank all of you for your time your trust for spending time with us

42:47 we hope you had fun and we look forward to talking to you again in the near future thank you

42:54 [Music]

43:04 you

Show more