1 00:00:06,970 --> 00:00:07,803 - [Tutor] So, as I mentioned 2 00:00:07,803 --> 00:00:10,000 to you before in an SDN solution, 3 00:00:10,000 --> 00:00:12,880 the control plane is separated from the data plane 4 00:00:12,880 --> 00:00:15,930 and implemented in a software application. 5 00:00:15,930 --> 00:00:19,950 It also allows you to do a lot of different integrations, 6 00:00:19,950 --> 00:00:24,240 and at the end of the day automate a lot of your tasks 7 00:00:24,240 --> 00:00:27,300 to provide better consistency. 8 00:00:27,300 --> 00:00:32,280 And of course, at the end of the day to minimize the effort 9 00:00:32,280 --> 00:00:35,980 of maintaining troubleshooting and operating a network. 10 00:00:35,980 --> 00:00:38,540 Now, also there are several security benefits 11 00:00:38,540 --> 00:00:41,370 to that because if you're consistent, 12 00:00:41,370 --> 00:00:42,730 of course it is expected 13 00:00:42,730 --> 00:00:47,100 that security best practices will be implemented 14 00:00:47,100 --> 00:00:48,810 in a more consistent manner. 15 00:00:48,810 --> 00:00:53,230 And as you also already learnt about the Cisco SDN Solutions 16 00:00:53,230 --> 00:00:55,600 like Cisco ACI and Cisco DNA Center, 17 00:00:55,600 --> 00:00:57,880 they provide a lot of capabilities 18 00:00:57,880 --> 00:01:00,730 to do either micro segmentation, 19 00:01:00,730 --> 00:01:03,570 or very robust segmentation policies 20 00:01:03,570 --> 00:01:06,640 and also to maintain visibility 21 00:01:06,640 --> 00:01:08,610 into what is actually happening in the network, 22 00:01:08,610 --> 00:01:12,130 especially in DNA Center you have things 23 00:01:12,130 --> 00:01:15,280 that can be integrated like the Cisco ISE Solution, 24 00:01:15,280 --> 00:01:17,780 so the identity service engine for you 25 00:01:17,780 --> 00:01:22,120 to perform a lot of robust policy enforcement 26 00:01:22,120 --> 00:01:25,260 and visibility integrating with other technologies 27 00:01:25,260 --> 00:01:27,440 like the Cisco's StealthWatch as well. 28 00:01:27,440 --> 00:01:31,500 So these technologies not only allow you to scale 29 00:01:31,500 --> 00:01:34,260 and be consistent, but also provide a lot 30 00:01:34,260 --> 00:01:36,050 of security capabilities as well. 31 00:01:36,050 --> 00:01:39,320 We already mentioned the Cisco ETA Solution 32 00:01:39,320 --> 00:01:43,050 for detecting threats in encrypted traffic, 33 00:01:43,050 --> 00:01:46,210 and gaining visibility of what's actually happening 34 00:01:46,210 --> 00:01:49,810 in the network with integration with Cisco's StealthWatch 35 00:01:49,810 --> 00:01:53,570 and at the end of the day providing consistent 36 00:01:53,570 --> 00:01:55,500 and very robust policies 37 00:01:55,500 --> 00:01:57,883 to the underlying networking devices.