2- Application Rollout and Provisioning


Introducing new applications to a network requires several configuration steps, such as defining the security zones in which the application's components will be deployed, establishing communication restrictions between security zones, managing IP addressing, configuring physical ports, and ensuring external network connectivity.

Like the previous approach for designing and provisioning the network and devices, the application rollout in the network involves similar steps, including intent management, network scheme generation, simulation, and, ultimately, the implementation and verification of the scheme.

In the upcoming tests, we will go through all those steps in detail.