SDWAN FAQs -Datacenter Edge

FAQs

1. What is the general functionality and main components of Teldat’s solution?

2. What are the possible choices for the “Datacenter Edge”?

3. Does “Datacenter Edge” supports redundancy?

4. What configuration is needed?

1. What is and what is the functions of the element “Datacenter Edge”?

Each device in the network exports traffic information to the visibility server using Netflow. All of the data is then added to a Big Data engine and presented to the user in an intuitive graphical interface with multiple filter options and visualization modes.

2. What are the possible choices for the “Datacenter Edge”?

For small networks, up to 200 remote points and 300Mbps aggregated, is available a solution based on proprietary hardware, Teldat RXL14000.

For any size of network, software vRXL is available in ISO format, to run on bare-metal or on a VM on KVM, or AMI format (Amazon Machine Image) to run on Amazon.

3. Does “Datacenter Edge” supports redundancy?

Yes, it is possible to use 2 Datacenters Edges in high availability mode, in active/active configuration, i.e. in a usual situation each one is supporting X remote sites and in case of one of them goes down, the other one assumes its connections (2X connections).

4. Does “Datacenter Edge” support scalability?

Yes. A Datacenter Edge (or couple of them in redundant mode) provides services to a specific number of sites and supports a specific aggregated throughput, but as many Datacenter Edges (or pairs of them in redundant mode) as desired can be installed.

Read our latest Blog Posts

Developing a Robust Disaster Recovery Plan in the Cloud

Developing a Robust Disaster Recovery Plan in the Cloud

In an increasingly digital world, businesses depend on cloud-based systems for everything from data storage to critical applications. While the cloud offers significant benefits—such as scalability, flexibility, and cost efficiency—it also presents new challenges in...

Quadruple Extortion in Ransomware: The Evolution of Cybercrime

Quadruple Extortion in Ransomware: The Evolution of Cybercrime

The advance of the Internet and new technologies has led to major developments in companies and organizations, but it has also led to a large number of threats in the field of cybersecurity. The Evolution of Ransomware to Quadruple Extortion Ransomware has emerged as...

The Importance of Cybersecurity in the Healthcare Sector

The Importance of Cybersecurity in the Healthcare Sector

In recent decades, the healthcare sector has undergone a profound digital transformation, enhancing efficiency in patient care and information management. However, this shift has also made healthcare organizations more vulnerable to cyberattacks. The systems handle...