Top SD-WAN: Competitive Webinar
Feel the need for speed?
Stay off the sidelines by choosing the right SD-WAN solution for your network. Fly with us through this webinar as we demonstrate why AI-driven SD-WAN powered by Juniper’s Session Smart™ Routing is the “top gun” of the market. Discover all the ways AI-driven SD-WAN beats the competition—all while brushing up on your Top Gun trivia.
You’ll learn
Top five reasons Juniper’s SD-WAN is the best on the market
Why competitors’ legacy SD-WAN solutions can’t keep up
Six reasons why tunnels slow you down
Who is this for?
Host
Guest speakers
Transcript
0:11 do you feel the need for speed well you've come to the right place hello
0:17 pilots and welcome to top sd-wan where we'll be comparing juniper's sd-wan to other solutions out there
0:24 do you want to know who's the best [Music] well first i want to introduce donald
0:30 truschinsky your instructor callsign cavalry don what's your role in this dog fight
0:38 i am don truscinski call sign cavalry join you today as cto of global sales
0:44 from 128 technology now with juniper networks uh we're thrilled to be with you here today as juniper to share why
0:52 we are the top gun the top sd-wan in the market i've been piloting networks for many of
0:59 the top world's top networks uh networkers like yourselves today i've been piloting
1:06 for over 30 years now since top gun was even made i believe we're entering an era of true
1:12 innovation that networking has not seen in about 20 years uh we're going to talk
1:19 about our tunnel free sd-wan solution if you've lost that loving feeling for
1:24 cisco hewlett-packard vmware any of these other legacy 61 solutions i invite
1:31 you to deploy juniper today with our ai driven enterprise networking we've got the
1:37 world's leading solutions that we will tell you about nice don and i'm tarik radwan i'm lead
1:44 product marketing manager here at juniper and my call sign is duck and i'll be your rao don your radar
1:51 intercept officer and you know with that this is kind of fun we want to have a lot of fun with
1:57 you today um and i'm thinking we just kind of jump in um
2:02 one of the things that um that we'll do is we'll try to kind of explain to you why we think our solution
2:10 our suv solution is the best and so we're going to go over top five
2:15 reasons why juniper sd-wan leaves the rest in the dust and as we're doing this again we're
2:21 going to try to have a little fun so we'll insert some some top gun trivia hopefully to keep you engaged
2:27 and so the first thing is around air superiority why is session based technology from uh
2:34 from juniper way better than the alternative and what is the alternative don maybe you can kind of talk us
2:40 through that yeah so you know we work with a lot of customers and
2:46 one theme is always true there are constraints on bandwidth somewhere in the network
2:53 and you know you look at an lte you know talk about air superiority right lte satcom you know but even broadband uh
3:00 any of the mpls networks that they are always to some degree bandwidth constrained
3:06 and so by having a session based router and a session based sd-wan solution you
3:13 can eliminate tunnels save that bandwidth while still performing the steering uh and context
3:21 aware networking uh that you need to accomplish your mission all right so let's talk about how that
3:27 works now we've got under the hood in the juniper ssr
3:32 we truly have a session oriented uh metadata based routing mechanism so when
3:38 a packet comes in we look at the very first packet we don't have that
3:44 session signature in the fast path we're going to look that up we're going
3:49 to send that off to uh we're going to we're going to escalate that to uh to the general and we're going to say all
3:54 right does this session have permission to communicate across the network if so
4:01 we'll allow that per policy will now pop the source and desk address
4:07 put that into metadata no longer are you tunneling every single repetitive signature of a
4:15 packet across your network we send the metadata one time and one time only
4:21 to establish the session across any given link in your network
4:26 we then steer traffic through waypoints that could be a network of waypoints across any network any transport
4:33 we evaluate the topology for quality security
4:39 we choose a vector based on performance where does that session need to go right now it's not where the tunnel has
4:45 already been it's where that session needs to go right now across the entire fabric
4:51 and we can route that end to end through a network of ssrs to achieve sd-wan
4:57 tunnel-free and so that's true innovation in routing that we have not seen in 20 years and
5:05 that is clearly why we number one reason why we are the top sd-wan top gun on the market
5:13 nice and maybe you could talk about how it's a bit different and how it kind of helps you
5:19 um you know as as the network operators out there to make your life easier
5:25 well so you know the complexity of of deploying a topology right so trying to bring up a network of tunnels uh
5:32 choosing a mesh and hubs and spokes all of those challenges can be very very
5:38 simplified when you have a network of peering routers so we deploy nodes they learn about each
5:45 other and create the topology for you and then as you route sessions you route
5:52 them on demand you can go multiple hops through a network of ssrs and uh and
5:59 very easily deploy the topology of your choice another way that we you know simplify
6:05 operations um is to put a named data model around the applications uh sure we understand
6:11 office 365 and twitter's and the netflix but we also make it extremely easy to
6:17 put words around the traffic that your business most cares about right you know what is mission critical
6:24 for your network why can't you describe your business policy in terms of what's
6:30 important to you and so we take all the access control lists the ip addressing and we we can uh
6:37 use instead a name data model that allows you to see the traffic in the
6:42 words that you care about uh gives you uniform global service policy makes your network uh and your sd-wan so
6:50 much easier to operate you can see exactly what's going on
6:55 and do you have any uh interesting customer stories to share where this has actually helped them
7:01 well absolutely all of our customers are leveraging the tunnel free approach and all of our customers leverage a name
7:07 data model um i i heard a funny story about a competitor where uh you know
7:13 they they said oh you know sd-wan has become really popular so what we did was we named renamed load balancing
7:20 in our solution to become sd-wan well let me tell you load balancing is not an
7:26 sd-wan uh session-aware routing and tunnel free routing is zesty when sdwin
7:31 3.0 nice i think uh it's time for a little fun
7:38 let's let's do our first trivia and one of the things and i think i feel like just putting on these glasses from
7:44 time to time so here's a question for all of you and this is a poll
7:50 so what is the name of the base in top gun the military base that's used
7:56 there give you guys like uh say 10 seconds to respond
8:06 and by the way these are all bases in california so that's a hint it actually happens in california
8:16 okay let's see what the results look like ah you guys uh mostly got it that's
8:21 right miramar so in the movie you boys are going to miramar
8:26 excellent let's move on to the next
8:31 the next point which is around breakthrough economics so we talked about sessions we talked
8:38 about how they're different and how they they allow you to do things that are different are there any other
8:44 um you know interesting things that kind of come out what are the benefits that that happen because of sessions
8:51 well tart nobody likes to pay tax i mean that's that's one thing we can all agree upon right and
8:58 you know i i i do meet a lot of customers that don't fully appreciate the difference between sort of that
9:04 dirty little secret of tunnels and you know the tunnel free approach that we've taken
9:10 you know the reality is no matter how you build your tunnel you know be it ipsec or vxlan or gre
9:17 uh you're going to be putting stacks of headers on each packet and yeah you might have some long
9:23 packets here and there and and the percentage of overhead is down but all of those need to be acknowledged the acknowledgements have to be funneled
9:30 it really adds up and it's taxed and it just happens to be about 30 percent on average in fact we put that into our
9:37 user interface so that we can show you really what your tax that you're paying is um you know if
9:42 you're going from client to cloud all the way from client to cloud you will have a bandwidth
9:48 cost associated with this and uh you know when we're talking about breakthrough economics you know a big
9:55 part of that is the bandwidth reduction the ability to easily steer traffic uh
10:00 to a data center when necessary uh potentially over your choice of circuit uh eliminating back call
10:07 that can save you cost obviously a huge aspect is to be able to
10:12 leverage all of the bandwidth in the network so if you're routing sessions instead of tunnels you can choose on an
10:19 application by application basis how that lays out in your network according to the performance and sla that you need
10:26 and so the ability to truly leverage you know not just again a apparel two
10:32 parallel tunnels but any path in the network uh for multipath is is critical
10:38 and then of course to be able to control the traffic and so um i don't want to pay the tax of maybe a
10:45 user going out to um you know a random internet application and competing with my business applications so the ability
10:52 to police those sessions right being aware of them in the first place the ability to then assign bandwidth
10:58 prioritization according to sessions and applications is critical and then of course to scale
11:05 so uh your complexity creates cost and so the ability to scale the
11:12 head end very simply the ability to scale the control plane
11:18 uh essentially the conductor uh the management solution uh to thousands of
11:23 nodes uh is critical it will save you time it'll save you money uh and our
11:29 competitors just just don't fly that way excellent
11:34 um any interesting stories uh maybe in terms of head end cost savings at our
11:40 customers or something to share there yeah we had a very large uh pharmacy uh that you know
11:48 looked at the alternatives in the market uh they looked at those obviously tunnel-based solutions uh they required
11:55 a very complicated head end uh stacked up uh they did the math they looked at uh
12:01 the amount of bandwidth they were putting on to their network i realized it was about five terabits per day um
12:07 granted it's 10 000 sites uh but uh five terabits per day uh you know
12:13 that's a huge economic burden uh that they didn't that they didn't uh appreciate right and so you know again i
12:20 call it you know kind of the dirty little secret of of your competing sd-wan is that they're stacking funnels
12:26 uh that cost you money this customer realized it and they're happily deploying thousands of ssrs
12:33 excellent that's great let's move on to another fun little poll
12:39 and so for this one let's see what it says uh which military branch
12:45 does the top gun organization belong to in the movie trick question warning for question
12:51 warning yeah
12:56 oh and as you guys respond to this poll one thing i forgot to mention at the top is that we are raffling away
13:03 a nice pair of ray-ban sunglasses to one lucky winner at the end of this
13:08 webinar so stay tuned for that please and let's
13:15 let's see how you guys responded ah
13:21 i see uh navy um air force is second marines and army
13:27 you know that's that's interesting um so in fact the answer is navy yeah
13:34 yeah that's right so miramar belonged to the navy during the making of top gun and uh the marines
13:41 took it over they stormed the uh the base and took it over in 1996 so
13:46 that's a that's a trick question excellent yeah that's that's that's neat
13:51 so in terms of now let's kind of switch gears and talk about
13:57 the dog fight we're all experiencing with protecting our um
14:03 you know our our organizations from from hackers and from bad actors out there can you talk a
14:10 little bit about you know the bulletproof security that because of the session design and svr
14:17 and some of the things you talked about how that actually improves security like significantly
14:24 well when your sd-wan solution is built with security in mind from the ground up
14:30 you don't have to uh add it on bolt it on a tunnel to it
14:35 tunnel from it right and so you know that was a huge part of the thinking at 128 technology
14:41 right now juniper networks in the building of the solution uh so the ability to
14:47 once you've got uh the session level intelligence in the router itself right so no longer do we have a stateless
14:53 packet forwarder with security kind of bolted on top what we have is a router that now understands uh every session
15:00 going through it and you can put into place deny by access uh deny by default access policy uh the hop i hop
15:08 authentication aspect is also quite interesting you want to you want a huge uh guard out front of the base right so
15:15 the ability to to now limit your peering and your scope of uh or really your
15:21 surface area uh that you can access the sd-wan um you know ensures security out
15:27 of the gate right and so uh we do hop-by-hop authentication when we have that metadata tag in there we can look
15:34 at the encrypted metadata understand uh even authenticate that that packet
15:39 understand whether it's a valid even initial packet to establish this session so you've got an extra layer of security
15:46 at the front door and then you've got the ability to adaptively encrypt and
15:52 again this is just another way we just blow away the competition uh in our ability to adaptively cr encrypt but
15:59 tunnel free and that adaptively encrypts so remember we've got that metadata
16:04 signature that can tell you what the context of the session is right what segment it came from who's the tenant
16:10 who's the service it's trying to reach and should that be encrypted should it be encrypted if it's already
16:17 encrypted so adaptive encryption uh is helps you with performance it also helps
16:22 you with security and then when you you're setting up sessions directionally so i come into the fabric at the ingress
16:29 think of it almost like an ingress zone at the edge of the fabric now i can carry context end to end throughout that
16:36 fabric and when i egress you could almost think of that as an egress zone out of the other end of the fabric so
16:43 you've got a session stateful distributed firewall built into the sd-wan solution from the ground up if
16:50 your current sd-wan or your your competitive thought is is that uh you know you're
16:56 going to deploy sd-wan and then pile security on top why not have it be part of the solution from the ground up have
17:03 that be part of your policy model your data model uh it's just so critical uh
17:08 you know just go ahead and search for uh uh security issues with sd-wan and you'll
17:14 find companies out there where security was truly an afterthought to their sd-wan
17:20 and that's just another way that we are top gun in this market
17:25 can you talk a little bit about it oh sorry yes
17:30 maybe talk a little bit about route directionality in terms of securing like what's what's
17:37 what's special about that because i get really excited about this one so
17:42 just because i have access to the cloud doesn't mean my enterprise needs to expose its footprint to the cloud just
17:49 to have kind of connectivity right so if you're setting up your routing your sd-wan in terms of vectors right we're
17:56 routing with vectors why wasn't routing always sort of done in term vectors
18:01 we had to add security as an afterthought if i can define a policy that is different between me and the
18:07 cloud and maybe the cloud and my enterprise you have you know true security and it's a true uh firewall
18:14 uh when we set up the session we set up both the forward and reverse direction at the same time
18:20 we can convey the context to the next hop so they can set up the forward and direction and reverse direction at the
18:26 name is at the same time and so essentially that is a true stateful uh distributed stateful uh
18:33 firewall and you gotta check yourself so right so you look at all these logos here uh you
18:38 know we spend a lot of time evaluating our own security uh you know we talk about
18:45 customers that that appreciate this uh we work with the us air force uh the u.s
18:50 army uh they appreciate our security from the ground up in fact they love the fact that they got metadata when they
18:56 send a packet out to a public network uh off off net shall we say uh they they uh
19:04 they tag that with metadata and uh ensure that that front door is is locked um they're also a great partner
19:11 of ours uh microsoft's a great partner of ours um in evaluating the security of
19:16 the solution and and so it's you know if your vendor is not checking themselves
19:22 uh constantly also uh being checked uh by their customer base around security
19:28 then i think you uh you you may be at risk for a big crash
19:34 excellent that's great let's let's move on to our next uh trivia question
19:40 um let's see if i can read these ah which branch of the military is portrayed in top gun
19:51 i think it was space force right i think the space force
19:57 you know they were up in the sky right that's right were they inverted
20:02 i think at one point they were inverted
20:10 and let's look at your responses let's see what you guys say air force that's a pretty big one 39
20:18 percent of you and uh the the number one response is navy in fact it is navy navy is the uh
20:26 is the uh the branch of the military that's that's shown in top gun excellent
20:31 so in terms of now sort of pushing against the barrier like you
20:37 know we blow past the sound barrier and you know we're able to provide this
20:44 this edge of the envelope type performance maybe you can talk a little bit about
20:50 sort of the results of that like all this you know the capabilities combined with the security that's already built
20:56 in how does that help to to push the the performance of the of the sd-wan
21:03 yeah so you know i i tell customers just take a look just try it out uh you put
21:09 it on the network and see how it performs um and here's here's a chart uh of a
21:15 customer who did just that they deployed the technology in place of an ipsec tunnel based solution
21:23 i think it had some extra stack tunnels in there as well like a dmvpn or something like that and
21:29 and what happens is you know if you've ever tried to troubleshoot a tunnel um and understand whether it's up or down
21:36 um the establishment time uh if it is uh down and needs to be re-established um
21:41 there's a just a lot of legacy negotiation in there um and so what happened in this
21:47 particular customers network was that they they saw you know bouncing of
21:52 tunnels they saw extra latency due to inefficient routing and you know that
21:58 caused application uh performance challenges you may guess which day they deployed uh
22:04 the ssr that would be day 15 and it was interesting because
22:10 it both uh influenced you know not only the availability of the network not only
22:15 the uptime uh from a session and application basis uh also lowered the latency improve the network performance
22:22 and so you know again i i think it's important to uh you know there's there's a lot of mechanisms
22:29 out there in the network um you know where they claim to improve performance but then they just don't mention the
22:34 fact that there's a tunnel headers on there um and establishing tunnels sometimes dynamically and and that just
22:40 takes a lot of work um make creates a lot of complexity and this visually
22:45 shows you what the end result is yeah and i hear that like the users at
22:52 the site they're like wow the applications are running great everything's running so smoothly
22:58 now so you know it actually does drive the user experience
23:03 but not only that i feel like also the the headache of tunnels and the overhead
23:09 of tunnels prevent tunnels from providing connection to some interesting sites right
23:18 exactly inefficient routing uh latency i mean so we're just going to lower latency it's going to be a better
23:23 experience you know that application download um especially again over um you know the
23:29 variety of links we expect to be part of an sd-wan uh you know it's a real payoff
23:36 another thing you know when we're setting up that session uh you know we drop that down into fast path uh once
23:43 that metadata has been conveyed and our forwarding plane becomes extremely
23:48 simple so if you look at um you know essentially the the
23:53 the router will begin to act more like a nat gateway to and from waypoint addresses and and give all of that
24:01 bandwidth back to the application so that can completely eliminate fragmentation if you don't have
24:07 encryption and and especially even with the adaptive encryption approach you can still run encrypted uh traffic
24:14 completely eliminate fragmentation which again can create latency can uh you know can
24:20 just simply cause connectivity issues in the network and so again i urge you to just take a look
24:26 and and try it out excellent let's move on to our next poll question
24:32 or actually do you want to talk a little bit about uh tunnels yeah for sure i mean uh you know there
24:40 they are one a one-lane highway right and so i talk a lot about entropy um trying to
24:46 achieve entropy uh you know if you look back again over 30 years you know there's always been sort of this micro
24:52 flow performance in networks you know you can you can divide up packets gotta eventually send them over
24:59 a circuit in a path and so whatever that microflow performance is now your tunnel
25:04 is going to be subject to it and you know and the more entropy you have
25:10 in this in your sd-wan the better it will overall perform even through the
25:16 service provider network through the internet right so you don't want your tunnel bunched with a kind of a noisy neighbor
25:23 if you will and so to to relieve yourself of that kind of one lane highway uh can can lead
25:29 to application performance improvements uh you know again that just the congestion that goes along with that
25:36 you know i talked a little bit about the fragmentation uh you know that that uh you know it's a
25:41 huge headache i think for a lot of network operators um so the folks that uh you know see this approach uh you
25:48 know to being truly tunnel free and potentially to be able to use the entire length of the packet
25:54 we certainly disguise uh you know if there is any um you know mismatch and packet size we uh can perform uh pack
26:01 and fragmentation is needed for example if you've got encryption overhead uh but you really you know the goal is to
26:07 simplify um and you know in tunnels do not achieve that goal uh you know if you look at uh even
26:13 setting up a tunnel maybe i wanna you know move traffic over to lte or on to the air
26:20 last thing you wanna do is wait and uh you know provide a user at a checkout counter or um even a you know a navy
26:27 pilot some kind of a delay in uh transferring traffic over a new path
26:32 right and so you're always on right i just simply send a session with metadata that's been encrypted and uh
26:39 opens the front door with the key then you know i've got none of that latency and setup
26:44 and so uh you know again when we set up also set up that session end to end
26:50 uh you know i've even heard uh customers trying to leverage tunnels maybe go to a low balancing mode and the forward
26:55 packets will go one direction reverse in another uh you know again we're symmetric so we're always setting up
27:01 that session symmetrically and we can guarantee the reverse path when we move that uh session to a new path we can
27:08 remove and uh the forward and reverse direction at the same time and that applies even in a multi-hop and so
27:16 uh you know you are absolutely eliminating bottlenecks uh in the network and giving your network more
27:23 freedom to leverage the available bandwidth competing solutions and if you say the
27:29 market's got 40 sd-wan solutions 39 of them are going to be tunneled and um and
27:34 so we are top gun we are top sd-wan in this market because of this
27:40 excellent let's add one more uh
27:45 question here so what song does goose play on the piano this was uh one of the scenes uh
27:52 where they're they're enjoying their time was it you've lost that loving feeling was it
27:59 tutti frutti great balls of fire or johnny be good
28:06 this is tough this is maybe not maybe not for the
28:12 folks with a good memory but i don't know about you don but i must have watched top gun on vhs
28:20 like 57 times at least growing up
28:27 and the answer yep you guys you got it great balls of fire yeah goodness great oh my gosh
28:34 and now so how do we how do we um now let's tackle the the last um area
28:42 why we're where we're the best and that's around the aiops how do we
28:47 bring artificial intelligence and artificial intelligence to the operations to make
28:53 life easier and kind of like the bigger picture now for folks that have not looked at the
28:59 juniper enterprise solutions these days uh we dominate uh we dominate not only
29:05 through tunnel free sd-wan but you know true ai driven operations
29:11 so you know this really originated uh with the miss solution and marvis and
29:17 the miss cloud now the notion was to say all right there's so much data here we've got
29:22 wi-fi signals we've got i don't know dhcp servers dns servers out there that all have to function in
29:29 harmony and you know there's so many places to look when there's a challenge in the
29:35 network right and the networking folks we just tend to be you know kind of that center of reconnaissance right if you
29:41 will uh you know hey what's going on because we've got visibility into the applications we've got visibility into
29:47 the dns the dhcp we've got visibility into it all but why does that mean you know that we have to as human beings
29:54 always spend time troubleshooting why can't we have an ai engine that takes the data
30:01 from a wi-fi edge into an intelligent switching platform a
30:07 wired lan potentially through additional security tools into an sd-wan edge and then bring the
30:14 data together about how all the tools in the toolbox are performing and then
30:20 process that through an ai engine um you know this is 2021 and and uh one
30:25 of my funny quotes from a customer was uh this is the year 2021 and nobody can
30:32 tell me where my packs are right and you know and to go through that as manual process uh can be unfortunately rigorous
30:40 so by bringing marvis and bringing juniper and missed ai into your network into
30:45 your sd-wan solution uh you can now begin to uh you know free yourself uh
30:53 leverage ai to understand which components potentially which applications maybe which links
30:59 uh you know which airwaves are working well and which are not and and that's
31:04 what it's all about and that's why we're just kind of blown away the competition when it comes to network intelligence
31:10 uh we want to be proactive we want to understand what's happening potentially tasks that you may need to
31:17 pay attention to and there's no reason in the year 2021 that you shouldn't be able to find your
31:22 traffic and so we're optimizing it all the way from client to cloud
31:28 yeah it's it's uh i like the way you phrase that the the one thing that people
31:34 are looking for is to save time and if you can allow the ai to take over some of these rote tasks
31:42 you know it then is able to find that needle in a haystack much faster than you could and so answering a
31:49 question like what this slide says like why is my zoom call breaking up we've all experienced this
31:54 because sometimes it's like the number one complaint that we hear you know what's wrong with bob's video
31:59 call yesterday is it the wireless is it the wired you know is it is it something on the on the
32:06 application server right like where where is this problem originating
32:12 uh and being able to correlate across all these areas is like the holy grail
32:18 uh and so we're able to to bring that to market we actually have this available
32:23 uh and so it's it's a it's pretty impressive and i don't think anybody has anything on us when it comes to
32:30 artificial intelligence this is true you know if the sd-wan
32:35 solution truly understands sessions it can look at those sessions and say hey am i seeing tcp re-transmissions
32:42 uh which servers am i seeing tcp re-transmissions does that correlate back to a link in my
32:49 network or does that really correlate back to a service or a server in my network
32:54 and so with all the fine-grained visibility you get with the session aware sd-wan you can now very quickly uh
33:01 troubleshoot whether it is links uh servers services uh is it taking a long
33:07 time to set up a tcp connection to a particular server or set of servers
33:12 this is uh this is critical information you know any of us that have
33:17 spent a lot of time looking at uh you know troubleshooting and packet captures uh you know understand that we
33:25 can benefit a lot from an ai engine and that ai engine
33:31 should reside in the cloud and it does reside in the miss cloud we can benefit a lot from that doing the
33:37 processing uh you know again when you've got uh you know kind of a console you know your
33:42 cockpit uh you know is doing a lot of work for you um you know think about flight you know it's moved from uh
33:48 you know a single stick to uh tons of ai that you know helps you fly the aircraft
33:54 uh you know that's what we set out to achieve you know with your enterprise solution and we're truly innovating i mean
34:00 networking has not seen this kind of innovation uh in years and so i'm thrilled i'm super excited to be part of
34:06 this yeah and just a quick trivia in terms of the name marvis it actually uh
34:12 the founders um at mist they they chose the name marvis a sort of a playoff of
34:19 jarvis from you know the um the ai in um in the suit that iron man
34:25 wore so uh again you know the idea is that you have the help there marvis is there for you
34:31 um i think don this was excellent i see we have tons of questions that have come in
34:37 do you want to spend like uh uh a couple of minutes here maybe picking out a couple of these that um
34:43 we might do some adjustments yeah let's do what we can and uh you know
34:48 we've got time to cover them let's do it if we have to uh delay the release of top gun two and uh
34:56 yeah uh let's see what's a good question here do i need an ip public
35:03 a public ip for the conductor oh no yeah so that's um
35:09 that's one of the things that we just yeah we want to keep in the solution right is the ability to run that public
35:15 and private you can certainly run the conductor completely on a
35:20 private network with complete insulation from you know the internet obviously i mentioned air force and army
35:27 they have strict requirements and we are we are not attached to public networks uh you know
35:33 for uh for uh purposes of orchestration so um you know that's uh that's a key
35:38 aspect a key characteristic that we'd like to keep we obviously want to leverage public
35:44 cloud for the customers that uh that can do that and um and make it super easy to
35:49 deploy but we can run all private today here's another interesting question uh
35:55 very technical does the solution use fec feck
36:01 yeah so you know we have what i call you know kind of a one-to-one effect uh today
36:08 and um and so forth correction being right i want to get to the other end and correct any errors packet loss uh that
36:14 may have occurred so uh in fact i just talked to a customer yesterday um you know they don't
36:20 necessarily want to have to tune this um they're like all right for certain services maybe it's a voice service or
36:26 whatever's critical to my business if i could just duplicate packets across multiple links
36:31 i'm good to go and what i call uh one to one fec obviously we're doing a lot of work to
36:37 optimize that i've got the session intelligence and the ability in software based
36:42 uh our software-based solution uh do um to to uh to optimize and manage that on
36:47 a per application basis but we do support uh what i'll call one-to-one effect today
36:55 excellent a question about hardware uh what what are sort of the the requirements uh in terms of hardware to
37:02 to run it yeah so you know this is another thing that i've i've really wanted to uh to
37:09 keep as part of the solution is uh you know the flexibility uh to deploy on
37:14 your choice of hardware and that's not easy to do uh we spend a ton of time certifying platforms uh call
37:22 it certified plus you know we definitely would like to steer you towards the certified plus
37:27 those are going to be tested every release every patch and uh you know you know you're running on uh you know
37:33 certified hardware um that could even be hardware uh you know it was part of the juniper portfolio we want to take
37:40 advantage of that but uh when it comes to hardware uh we'll give you a choice anywhere from uh i've got a little uh
37:46 300 box on my desk right here that's actually wired in so i i can't pull it over but um anywhere from that small
37:53 unit all the way up to uh you know the largest of servers um in which we can run uh we've even hit 100
38:00 gig speeds because of the efficiency of the solution on some of the high-end hardware so uh you know we really want
38:07 to um you know to give you the choice and work with you on that
38:13 sort of a related question what about the nfx is there something interesting happening
38:19 there yeah absolutely so the nfx you know think of a unified cpe platform where i
38:25 want to run a lot of applications right so those could be juniper applications they could be your own homegrown could
38:30 be distribution could be file management whatever you'd like to do in the branch office um the nfx is an excellent
38:37 platform for that the ssr runs on it and you know continue to optimize
38:45 the way that runs on it but we made a lot of progress fast and um we support the
38:51 ssr on juniper hardware today great
38:56 it's actually another question on the integration that we have so far between the ssr and uh mist
39:04 can we talk a little bit about the integration so it's a little forward-looking um so um you know we
39:10 expect to release this to the masses uh later uh this year um but you know i've
39:17 never seen our team kind of rally around a concept you know this is this is one of the things when we when we looked at
39:22 combining forces between mist and uh you know all the juniper the ex switching and and the 128 technology ssr
39:30 uh you know it was clear that uh you know the missed ai cloud was a destination for a lot of this session
39:36 intelligence data right so uh telemetry about the network and we have tons of telemetry right on the
39:43 platform today there's like 800 stats you can go and and view you can do that through a single pane of glass apis with
39:50 high performance but the missed ai engine is absolutely the destination for that data
39:56 so we've got a bunch of systems feeding it today uh so that's how quickly we uh
40:01 went down that path uh you know in the great tradition of releasing reliable software you know we're going to do a
40:07 lot of testing and make sure that that's all ready to go and get it in your hands a little bit
40:13 later this year if you're interested in taking a look don't hesitate to reach out and we'll
40:18 give you a glimpse excellent we are getting a lot of questions
40:25 let's see anything look uh interesting to you don
40:33 um so thoughts on integrating with srx i mean it's a piece of cake we're all standards based right and um you know
40:40 the srx does have some cool tools in the toolbox uh as i say um i actually am
40:47 running through both the ssr and the srx talking into talking to you today um
40:53 service change uh in a very easy to deploy configuration um you know obviously uh you know juniper has had a
41:00 ton of great technology with junos and uh and uh and so these are easy to integrate if you find that you've got
41:06 some tools in the srx toolbox you want to combine the ssr that's uh
41:12 that can be done today excellent you know don i'm thinking we will
41:18 probably have to follow up with a lot of you folks i mean there are a lot of good questions coming in and we'll definitely
41:24 follow up directly with you um after after the event after this webinar
41:30 um any other parting thoughts don't
41:35 well i just really appreciate folks that took the time to join us today uh hopefully we hit on the high points uh
41:41 there are a lot of details here as i scroll through the questions uh you know it's uh you know the amount of uh data
41:48 in or you know bits in the metadata you know all these questions we'd love to jump on a call and drill down in um the
41:55 metadata size is based on the you know the words that you choose actually for the applications and
42:01 networks so uh maybe 100 bytes per session total um you know across the
42:06 entire network so um you know what you'll find is you know the most optimal i call it the most efficiently
42:12 architected sd-wan solution out there uh and we've got a tonic customers with uh
42:18 you know great ideas and you know deploying us in incredibly uh interesting ways
42:24 so sometimes we say hey you know give us your your toughest problem uh a networking problem and we'll help you
42:30 solve it uh we've got the tools in the toolbox and uh we want to be there with you flying for
42:36 the next 10 years using ai ops awesome thank you so much don thank you
42:41 for your time on this and we thank all of you for your time your trust for spending time with us
42:47 we hope you had fun and we look forward to talking to you again in the near future thank you
42:54 [Music]
43:04 you