-
Notifications
You must be signed in to change notification settings - Fork 14
added Cosgrid Vednor to zton.ytml #69
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
added Cosgrid Vednor to zton.ytml #69
Conversation
✅ Deploy Preview for zero-trust-network-access ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
|
Thanks for the PR @jaganath10486. Could you share an architecture diagram with us so we can sense check you're placed in the correct list |
|
@enclave-marc-barry Thanks for the response, I forwarded your request to our documentation team. I will get back to you with in next 24 hrs, Thanks you :) |
|
Hiii @enclave-marc-barry |
|
@enclave-marc-barry is there any update from your side? |
|
Hii @enclave-marc-barry |
|
Hi @jaganath10486, sorry for the delay in getting back to you. Just want to double check you're in the right architecture group. Thanks for sharing that architecture diagram. If I understood it correctly, it looks like there are four major components of the Cosgrid solution:
In your solution, do the endpoint devices The architecture looks like a bit of a mix of SDP and ZTON to me, depending on which platform it's deployed to. Unless I'm missing something, from the architecture diagram it appears that the Cosgrid solution creates connectivity between devices and workloads in different locations/subnets via connector appliances / or that all traffic flows via the MicroZAccess TURN Mediator, in which case is the architecture not an IDN? |
|
Thanks for the reply @enclave-marc-barry.
|
|
Still confused about whether you're placing Cosgrid in the correct category. The diagram below indicates that you have software running on endpoints (Windows and MacOS) and are also deploying connector appliances in front of IaaS, VMs, Containers, Linux and Windows and other endpoints. Is this not an architecture in which the clients connect to an edge device (albeit using STUN/TURN)? The diagram appears to show a conventional SDP architecture -- an "appliance at the edge", as I've highlighted on the diagram below, and not peer-to-peer connectivity between endpoint devices. I may be miss-understanding, does the Network Connector / App Connect / SD-WAN Gateway run on the endpoint Windows / Linux / MacOS operating systems directly and create a virtual network interface on the device, or is it deployed separately in front of the target endpoint? e.g. 100 Windows + Linux VMs == 1 network connector, or 100 network connectors? Please feel free to add further clarification, or update the PR to place the listing into the SDP category. |


No description provided.