0
50 Ways to Use BIG-IP<br />
Performance<br />Caching (WA)<br />Geolocation (GTM, LTM)<br />Quality of Service (QoS, Rate shaping)<br />Data deduplicat...
Security<br />Protocol Security (PSM) <br />Port lockdown (LTM) <br />DNSSEC (GTM) <br />E-mail security (MSM)<br />Applic...
Visibility<br />Heatmaps (iRules) <br />End-point inspection (Firepass, APM) <br />Traffic inspection (iRules) <br />
Optimization<br />Compression (WA, WOM) <br />TCP Offload (LTM) <br />SSL Offload (LTM) <br />HTTP Optimization (LTM) <br ...
Architecture<br />Application switching (iRules) <br />URL rewriting (iRules) <br />Resource obfuscation (iRules) <br />UR...
Availability<br />Load balancing (LTM) <br />Failover (LTM) <br />Global server load balancing (GTM) <br />Auto-scaling (L...
Load balancers are dead…<br />PSSST! Remember this secret phrase for<br />an extra chance to win a cool prize at Interop L...
All 50 Ways to Use BIG-IP
Upcoming SlideShare
Loading in...5
×

All 50 Ways to Use BIG-IP

3,138

Published on

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,138
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
253
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "All 50 Ways to Use BIG-IP "

  1. 1. 50 Ways to Use BIG-IP<br />
  2. 2. Performance<br />Caching (WA)<br />Geolocation (GTM, LTM)<br />Quality of Service (QoS, Rate shaping)<br />Data deduplication (WOM)<br />WAN Optimization (WOM) <br />Rate limiting (iRules) <br />Long-distance VMotion (LTM) <br />DTLS for PCoIP (LTM) <br />
  3. 3. Security<br />Protocol Security (PSM) <br />Port lockdown (LTM) <br />DNSSEC (GTM) <br />E-mail security (MSM)<br />Application access control (APM) <br />IP Blacklisting (ASM) <br />SQLi Prevention (ASM) <br />XSS Attack prevention (ASM) <br />Cookie encryption (LTM) <br />XML Security (ASM) <br />Secure remote access (APM, Firepass) <br />Data leak prevention (ASM, iRules)<br />FTP Security (ASM) <br />
  4. 4. Visibility<br />Heatmaps (iRules) <br />End-point inspection (Firepass, APM) <br />Traffic inspection (iRules) <br />
  5. 5. Optimization<br />Compression (WA, WOM) <br />TCP Offload (LTM) <br />SSL Offload (LTM) <br />HTTP Optimization (LTM) <br />Centralized certificate management (SSL) <br />Single Sign-On (APM, EGW)<br />
  6. 6. Architecture<br />Application switching (iRules) <br />URL rewriting (iRules) <br />Resource obfuscation (iRules) <br />URL shortener (iRules) <br />Application virtualization (LTM) <br />IPv6 Gateway<br />PKI CAC Integration (LTM, SSL)<br />Honeypot redirection (ASM) <br />Cookie gateway/proxy (LTM, iRules)<br />Custom error pages (iRules)<br />XML Routing (iRules) <br />
  7. 7. Availability<br />Load balancing (LTM) <br />Failover (LTM) <br />Global server load balancing (GTM) <br />Auto-scaling (LTM, iControl) <br />SIP Load balancing (LTM) <br />LDAP proxy (iRules) <br />Link Load balancing (LC)<br />DDoS protection (LTM)<br />Sticky sessions (LTM) <br />
  8. 8. Load balancers are dead…<br />PSSST! Remember this secret phrase for<br />an extra chance to win a cool prize at Interop Las Vegas: <br />LONG LIVE APPLICATION DELIVERY<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×