About This Document

This chapter describes how this solution guide has been structured. The document follows the same flow as an enterprise would at the time of deploying SAE for the first time – starting with planning, and ending with deployment of a new service.

Document Flow

The document is structured according to the stages an enterprise would go through when they decide to deploy SAE. Typically, enterprises would go through the following milestones in their SAE journey.

  • Assess and analyze existing infrastructure and traffic flows

  • Design services based on existing patterns so that they can be instantiated as required

  • Deploy hardware and compute requirements based on your service requirements and design

  • Deploy service chains

SAE Deployment Workflow

Target Audience

This guide is intended to assist enterprises that have some presence in colocation or carrier-neutral facilities and are looking at migrating to virtualized DMZs in such colocation centers. Essentially, such enterprises have data and applications spread over private data centers and clouds; and have traffic coming in from a wide range of trusted, semi-trusted and untrusted connections such as employees, partners, customers etc.

The target audience of this guide includes:

  • IT decision makers in multinational corporations that have a global presence

  • IT decision makers in enterprises with presence in carrier-neutral, colocation centers

  • Network architects, security professionals, application architects

  • CIOs


Note

This guide assumes that readers have a broad understanding of networking terminologies and principles. It also assumes prior exposure to current trends in multi-cloud offerings.