1.8 Summarize evolving use cases for modern network environments

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

What are the 3 layers associated with SDN?

The 3 layers are Infrastructure layer/Data plan, Control layer/Control plane and Application layer/Management plane.

2
New cards

In terms of SDN, what do the 3 layers do?

Infrastructure layer/ Data Plane: This layer is responsible for where the data is actually going.

Control layer/Control Plane: This layer is responsible how the data is delivered such as routing tables, session tables, etc.

Application layer/Management plane: This layer is responsible for how you manage the device such as SSH, console, etc.

3
New cards

What is a VXLAN?

A VXLAN (Virtual Extensible LAN) is designed for large service providers to provide better scalability, flexibility and network management than the traditional VLAN.

4
New cards

What is DCI?

DCI (Data Center Interconnect) is a way to connect multiple data centers together across geographic distances. An example would be a international provider that has multiple data centers for thousands of clients around the world.

5
New cards

Define VXLAN Encapsulation.

VXLAN Encapsulation takes the data from one datacenter, encapsulates it and sends it over a VXLAN tunnel to another data center somewhere in the world and decapsulates it when it arrives.

6
New cards

Describe what ZTA is.

ZTA (Zero Trust Architecture) is a design to where the user is continuously being authenticated, authorized and validated inside or outside of their organization.

7
New cards

How is Policy Based Authentication different from traditional Authentication?

Policy based authentication is more adaptable and doesn’t rely on static rules or roles of the user. Instead, it uses Adaptive identity and Policy based rules to determine several different risk indicators and evaluates each decision based on a policy and other information.

Traditional authentication is your typical username and password with minimal authentication required to access a resource you are wanting access to.

8
New cards

What does SASE do?

SASE (Secure Access Service Edge) is a network architecture that offers several different services in the cloud environment. It can provide secure and optical performance for users anywhere that are trying to connect to their cloud service. It’s essentially a next generation VPN for cloud.

9
New cards

What is IaC?

Infrastructure as Code is defined as a way to allow your infrastructure to be set up, configured and automated by code instead of manual interaction each time.

10
New cards

What is a Playbook for IaC?

A playbook is a term used to describe different tasks for what you are trying to achieve such as removing malware from a device, upgrading a device or configuration of a device.