In This Section
Welcome to the Zentera Systems CoIP® Access Platform Administration Guide!
The intended audience for this guide are technical users that have access to their organization's IT network infrastructure as well as developers who work on IT infrastructure automation, who will be deploying or managing infrastructure based on Zentera's CoIP Access Platform. Separate end-user documentation is available and covers topics relevant to end users.
About CoIP Access Platform
Zentera Systems’ CoIP® Access Platform is a powerful tool that helps address many difficult problems in modern application networking and security.CoIP Access Platform creates a proxy network fabric, which operates at Layers 4-7 of the OSI stack.This proxy network fabric allows users to configure anyclient-server application to communicate using any IP-based protocol, independent of network topology and routing.Furthermore, CoIP Access Platform enables network services to run above the proxy network fabric, including encryption, micro-segmentation, service mesh transport, policy-based file transfer, and service insertion. CoIP Access Platform is applicable to many different purposes, including:
Securing applications with a Zero Trust Network
Connecting applications that span cloud and on-premises boundaries
Connecting applications that span corporate or organizational boundaries
Securing application traffic over MPLS or direct lines
CoIP Access Platform is fundamentally different from other standard network tools, such as VPN, SDN and SD-WAN. All of these other approaches are focused on connecting networks to other networks – at Layers 2 and 3 of the OSI stack. While these tools are well-understood by IT practitioners, they have significant drawbacks in today’s fast-paced business environment. In particular, when connecting networks together, the potential impacts to function and security of the existing networks. This contributes to a slow pace of change which leaves IT organizations less able to adapt to the rapid pace expected by business units, who are now used to the speed with which they can create, deploy, and modify computing resources in the cloud.
In contrast, CoIP Access Platform decouples connectivityfrom network topology. Application connectivity is built out of compute elements – virtual machines in the datacenter or the cloud. Connection and security settings can be set by configuration files and APIs, eliminating arcane switch/router commands and BGP. These properties of CoIP Access Platform allow networking to be managed directly by the same business unit teams who are already responsible for the rest of the business application.
CoIP Access Platform enables advanced Zero Trust Networking. segmenting and securing user- and machine-to-machine traffic. Our unique approach blocks the untrusted network and uses strong certificate-based identity and access management to establish trusted connections. This overlay Zero Trust Network creates security that migrates along with applications and data to remote environments to meet dynamic business requirements. Zentera’s Zero Trust Network deploys above existing enterprise or cloud infrastructure, and can be implemented without infrastructure reconfiguration.
Topics this document is intended to cover include:
Overview of CoIP technology
Configuring and using the zCenter management portal
Setting up and managing Application Profiles
Throughout this manual, certain text may be displayed in a specific style. As you read this manual, these styles help provide context about the intended operational use.
A note contains information which should you should pay attention to.
A tip indicates information is not critical, but may help streamline administration – for example, saving time or effort.
A warning indicates important information which, if ignored, could interfere with normal operation.