Fabric Orchestrator

Automate Your Network

Avaya Fabric Orchestrator

Let Intelligent Software Do All the Work

  • Eliminate errors, enable new services faster, and drive down your operations costs. Network automation lets you turn time spent on manual, repetitive management tasks into time for making progress on strategic initiatives.
  • Bring comprehensive monitoring, provisioning, and troubleshooting to your Avaya network with our powerful appliance-based solution. Fabric Orchestrator reduces operational complexity with fault, performance, configuration, and security features that can help you save both time and money.
  • Set your own pace for transitioning to fully automated Software-Defined Networking (SDN). Fabric Orchestrator delivers programmability and automation to your traditional and SDN Fx™-enabled devices through integrated controller solutions and standard APIs. From here, it’s easy to evolve seamlessly to Avaya SDN Fx™ Architecture.

• Enable One Operational Model

Automate both traditional and SDN Fx-enabled devices. Evolve portions of your network over time while managing the traditional and the SDN segments of the network consistently.
 

• Eliminate Manual Processes

Accelerate time to service through bulk configuration and orchestration features. Comprehensive fault and performance management capabilities pinpoint network bottlenecks as well as the root cause of issues.
 

• Build for the Future with Open-Source Technologies

Deploy an integrated SDN Controller that’s based on Open Daylight. Northbound REST Interfaces allow for network automation and orchestration by both third-party controllers and open orchestration tools like OpenStack.
Industry Recognition
Avaya Wins TechTarget’s Network Innovation Award
Simplify Your Configuration to Reduce Errors and Save Time

Simplify Your Configuration to Reduce Errors and Save Time

Eliminate error-prone, hop-by-hop, CLI-based network configuration. Orchestration, provisioning, and bulk configuration features let you deploy services fasters while eliminating the risk of errors. Built-in wizards for configuring complex protocols and services can reduce network set-up time by as much as 70%.
Simplify Inventory and Asset Management

Simplify Inventory and Asset Management

Get a complete view of all the devices and end points connected to your network through discovery and visualization tools. Track inventory and assets to meet security and compliance requirements. Seeing even the most complex network topologies presented in end-to-end views helps you identify relationships among devices and perform impact analysis.
Pinpoint Network Vulnerabilities Before They Become Issues

Pinpoint Network Vulnerabilities Before They Become Issues

Capacity planning and change management just got easier. Monitor network modifications—such as the addition of a new switch—and observe how the network performs. Collect crucial information to address your capacity planning requirements. For example, if a certain threshold—like 50% bandwidth utilization—is being consistently exceeded, it can be addressed proactively.
Synchronize Your Network to Your Virtual Compute Environment

Synchronize Your Network to Your Virtual Compute Environment

Gain critical insights into the virtual machine lifecycle from activation through moves and changes to deletion. Automatically provision network devices to follow VMs as they migrate between servers. Build an end-to-end view of the virtualized environment—showing servers, applications and network devices—so that network and server administrator teams can work better together.
Get to the Root Cause Faster

Get to the Root Cause Faster

Quickly troubleshoot issues through integrated event management and root cause analysis tools.  Determine the most likely cause of the network outage through automatic correlation of all network events. Determine primary and secondary devices affected to determine the impact on users. Deploy a rich set of event handling features to ensure if something does happen, the right personnel are immediately notified.
Infographic
Prepared for the Everywhere Perimeter? Here’s what IT Pros Say about Segmentation

Prepared for the Everywhere Perimeter? Here’s what IT Pros Say about Segmentation

Get the stats >
White Paper
Cybersecurity through Hyper-Segmentation: a Practical Foundation for Network-wide Security

Cybersecurity through Hyper-Segmentation: a Practical Foundation for Network-wide Security

Download now >
Webinar
See Avaya’s approach to securing your network’s everywhere perimeter.

See Avaya’s approach to securing your network’s everywhere perimeter.

Watch now >

Connect With Avaya