Deployment and Configuration

Network Edge is a dynamic platform that allows the selection, configuration, and activation of network services into production in near real-time. This can be done through the Equinix Fabric portal or through RESTful API web services.

Network Edge includes a marketplace of available vendor-sponsored virtual images, an open source x86-based infrastructure platform that's optimized for the instant deployment, and configuration-ready interconnection of network services.

Network Edge enables a variety of use cases where time to market, proximity to the edge of major content and Enterprise services, minimal touch points, and other key requirements are a factor.

Network Edge users can perform the following in minutes:

  • Select an appropriate network service and/or vendor to match your immediate or long-term needs.

  • Choose the right licensing structure that works for your organization. You can bring your own license or use Equinix's managed subscription service where available.

  • Configure the device with basic settings in the portal or with APIs.

  • Deploy the device in the desired Equinix location around the globe.

  • Create connections to other devices, other Equinix services (such as Equinix Fabric), or access the device directly to implement additional configurations just as you would any other network equipment.

Deployment Articles

  • Reference Architecture – Offers a collection of articles detailing the fundamentals ofNetwork Edge architecture.

  • Architecting for Resiliency – Describes how Equinix designs for redundancy, and the features of redundancy as a service.

  • Connect Virtual And Physical Environments – Offers basic guidance on connecting virtual devices with colocation, ports, network connections, or other use cases.

  • Platform Architecture – Provides a detailed description of the network and systems that underpin the product, their specifications, and other relevant information.

  • Platform Security and Hardening – Describes the way we build and architect to protect your devices, data, and procedures from malicious or accidental events.