SlideShare a Scribd company logo
1 of 6
BIG-IP 4200V ADC PLATFORM
Leading performance to consolidate application delivery services




           October 2012
BIG-IP 4200v Platform
                             Consolidate App
Leading Performance                                       Enable SSL Growth
                             Delivery Services




BIG-IP 4200v delivers     The 4200v is a purpose-        BIG-IP 4200v enables you
leading performance for   built hardware platform with   to encrypt all data
mid-size enterprises,     the processing power to        transfers – without
cloud and service         deploy multiple                impacting server
providers                 application delivery           performance
                          services
BIG-IP 4200v
Leading performance to consolidate application delivery services

 • Target Market
     ‒ Mid-size enterprises, service and cloud providers
 • Leading Performance of Mid-Range ADC Platforms
     ‒ Highest application decisions per second
     ‒ Maximum SSL processing
     ‒ Hardware compression for reduced bandwidth utilization
 • Consolidate Application Delivery Services
     – Deploy traffic management, acceleration, security, and DNS services
     – Unified integrated platform on TMOS architecture
 • Enable SSL Growth
     ‒ Secure data in flight beyond logins and transactions
     – Offload processing from servers and reduce costs
BIG-IP 4200v
   Key Features and Specs
                               Intel Xeon Quad-core processor
                                       16GB Memory
    Hardware Compression                                                 80+ Gold Power Supply
                                                                         (Redundant PS option)
Hardware SSL Offload

            8x 1G ports                                              1U Rack Footprint
                                2x 10G ports


                                                          Specs
                L7 Fast HTTP Inf/Inf                    850,000 RPS
                L7/L4 Throughput                          10 Gbps
                L4 Conn/s                               300,000 CPS
                L4 HTTP RPS*                             2.5M RPS
                SSL TPS(1K/2K Keys)            45,000/9,000 TPS (Max Included)
                SSL Bulk Throughput                        8 Gbps
                HW Compression                      8 Gbps (Max Included)
                TMOS Version                               v11.2.1
                                                                                   * New Metric
BIG-IP Platform Line-up                                                                                       VIPRION 4480



                                                                                  VIPRION 2400
                                                                                                                   2.5M - 10M L7 RPS
                                                                                                                   1.4M - 5.6M L4 CPS
                                                                                                                    80G- 320G L4 TPUT
                                                                                                                    40G – 160G L7 TPUT
                                                                                 1M - 4M L7 RPS
                                                                                400K - 1.6M L4 CPS
                                                                           18G -72G/40G - 160G - L7/L4 TPUT

                                                                                    1 blade
                                                                                                                BIG-IP 11000,
                                                                                                                11000F, 11050,
                                                                                                 BIG-IP 8900,       11050F
                                                                                                 8900F, 8950,    2.5M L7 RPS
                                                                           BIG-IP 6900,              8950S       1M L4 CPS
                                                                           6900F, 6900S       Up to 1.9M L7 RPS Up to 42G TPUT
                                                          BIG-IP 4200v     600k L7 RPS        Up to 800K L4 CPS
                                                          850k L7 RPS      220K L4 CPS         Up to 20G TPUT
                                          BIG-IP 3900
                                                          300K L4 CPS      6G L7/L4 TPUT
                                          400k L7 RPS
                            BIG-IP 3600                   10G L7/L4 TPUT
                                          175K L4 CPS
            BIG-IP 1600     135k L7 RPS   4G L7/L4 TPUT
                            115K L4 CPS
            100k L7 RPS
                        2G L7/L4 TPUT
             60K L4 CPS
            1G L7/L4 TPUT


200M TPUT                                                                                           Designation after platform:
                                                                                                    F = FIPS
                                                                                                    S = Turbo SSL
            1 G TPUT
Leading performance to consolidate application delivery services

More Related Content

What's hot

Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Wireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics toolsWireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics toolsYoram Orzach
 
1Z0-997.pdf
1Z0-997.pdf1Z0-997.pdf
1Z0-997.pdfRosaR17
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
 
DCiM Evaluation Checklist
DCiM Evaluation ChecklistDCiM Evaluation Checklist
DCiM Evaluation ChecklistTREDS
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computingKomalah Nair
 
Meraki Solution Overview
Meraki Solution OverviewMeraki Solution Overview
Meraki Solution OverviewClaudiu Sandor
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 
Building Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSIBuilding Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSISplunk
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureMyNOG
 
Storwize v5000
Storwize v5000Storwize v5000
Storwize v5000liembkeb
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network AutomationLaurent Ciavaglia
 
Splunk HTTP Event Collector
Splunk HTTP Event CollectorSplunk HTTP Event Collector
Splunk HTTP Event CollectorSplunk
 

What's hot (20)

802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Wireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics toolsWireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics tools
 
1Z0-997.pdf
1Z0-997.pdf1Z0-997.pdf
1Z0-997.pdf
 
Ibm linux one
Ibm linux one Ibm linux one
Ibm linux one
 
Zero Trust : How to Get Started
Zero Trust : How to Get StartedZero Trust : How to Get Started
Zero Trust : How to Get Started
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Data centers on the Edge
Data centers on the EdgeData centers on the Edge
Data centers on the Edge
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
DCiM Evaluation Checklist
DCiM Evaluation ChecklistDCiM Evaluation Checklist
DCiM Evaluation Checklist
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computing
 
Meraki Solution Overview
Meraki Solution OverviewMeraki Solution Overview
Meraki Solution Overview
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Building Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSIBuilding Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSI
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native Infrastructure
 
Storwize v5000
Storwize v5000Storwize v5000
Storwize v5000
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network Automation
 
Splunk HTTP Event Collector
Splunk HTTP Event CollectorSplunk HTTP Event Collector
Splunk HTTP Event Collector
 

Similar to Leading performance to consolidate application delivery services

VIPRION Solutions - April 2012
VIPRION Solutions - April 2012VIPRION Solutions - April 2012
VIPRION Solutions - April 2012F5 Networks
 
BIG-IP Hardware Updates
BIG-IP Hardware UpdatesBIG-IP Hardware Updates
BIG-IP Hardware UpdatesF5 Networks
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2Jeff Green
 
cisco-xfp-10g-mm-sr-datasheet.pdf
cisco-xfp-10g-mm-sr-datasheet.pdfcisco-xfp-10g-mm-sr-datasheet.pdf
cisco-xfp-10g-mm-sr-datasheet.pdfHi-Network.com
 
1G SFP Optical Transceivers Data Sheet By JTOPTICS
1G SFP Optical Transceivers Data Sheet By JTOPTICS1G SFP Optical Transceivers Data Sheet By JTOPTICS
1G SFP Optical Transceivers Data Sheet By JTOPTICSJayani Technologies Ltd
 
Big Ip Platforms Customer Slides
Big Ip Platforms Customer SlidesBig Ip Platforms Customer Slides
Big Ip Platforms Customer Slidesadutto
 
10G SFPP Optical Transceivers Data Sheet By JTOPTICS
10G SFPP Optical Transceivers Data Sheet By JTOPTICS10G SFPP Optical Transceivers Data Sheet By JTOPTICS
10G SFPP Optical Transceivers Data Sheet By JTOPTICSJayani Technologies Ltd
 
Fujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100GFujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100Gkennliu
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)Jeff Green
 
Ap nr5000 pt file
Ap nr5000 pt fileAp nr5000 pt file
Ap nr5000 pt fileAddPac1999
 
Enterprise Edge Router Upgrade Guide
Enterprise Edge Router Upgrade GuideEnterprise Edge Router Upgrade Guide
Enterprise Edge Router Upgrade GuideRouter Analysis, Inc.
 
cisco-ws-c3850-48p-l-datasheet.pdf
cisco-ws-c3850-48p-l-datasheet.pdfcisco-ws-c3850-48p-l-datasheet.pdf
cisco-ws-c3850-48p-l-datasheet.pdfHi-Network.com
 
Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...
Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...
Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...Cisco Russia
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014Bruno Teixeira
 
11.greatway triple playproposal110422
11.greatway triple playproposal11042211.greatway triple playproposal110422
11.greatway triple playproposal110422carlosvicunav
 
Beyond 100GE
Beyond 100GEBeyond 100GE
Beyond 100GEAPNIC
 

Similar to Leading performance to consolidate application delivery services (20)

VIPRION Solutions - April 2012
VIPRION Solutions - April 2012VIPRION Solutions - April 2012
VIPRION Solutions - April 2012
 
Products
ProductsProducts
Products
 
BIG-IP Hardware Updates
BIG-IP Hardware UpdatesBIG-IP Hardware Updates
BIG-IP Hardware Updates
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2
 
cisco-xfp-10g-mm-sr-datasheet.pdf
cisco-xfp-10g-mm-sr-datasheet.pdfcisco-xfp-10g-mm-sr-datasheet.pdf
cisco-xfp-10g-mm-sr-datasheet.pdf
 
1G SFP Optical Transceivers Data Sheet By JTOPTICS
1G SFP Optical Transceivers Data Sheet By JTOPTICS1G SFP Optical Transceivers Data Sheet By JTOPTICS
1G SFP Optical Transceivers Data Sheet By JTOPTICS
 
Big Ip Platforms Customer Slides
Big Ip Platforms Customer SlidesBig Ip Platforms Customer Slides
Big Ip Platforms Customer Slides
 
10G SFPP Optical Transceivers Data Sheet By JTOPTICS
10G SFPP Optical Transceivers Data Sheet By JTOPTICS10G SFPP Optical Transceivers Data Sheet By JTOPTICS
10G SFPP Optical Transceivers Data Sheet By JTOPTICS
 
IAPsolutions
IAPsolutionsIAPsolutions
IAPsolutions
 
Fujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100GFujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100G
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)
 
Ap nr5000 pt file
Ap nr5000 pt fileAp nr5000 pt file
Ap nr5000 pt file
 
FPGA / SOC teknologi - i dag og i fremtiden
FPGA / SOC teknologi - i dag og i fremtidenFPGA / SOC teknologi - i dag og i fremtiden
FPGA / SOC teknologi - i dag og i fremtiden
 
Enterprise Edge Router Upgrade Guide
Enterprise Edge Router Upgrade GuideEnterprise Edge Router Upgrade Guide
Enterprise Edge Router Upgrade Guide
 
cisco-ws-c3850-48p-l-datasheet.pdf
cisco-ws-c3850-48p-l-datasheet.pdfcisco-ws-c3850-48p-l-datasheet.pdf
cisco-ws-c3850-48p-l-datasheet.pdf
 
Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...
Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...
Инновации в архитектуре маршрутизатора ASR9K. Технология сетевой витруализаци...
 
MWC 2010 LTE
MWC 2010 LTEMWC 2010 LTE
MWC 2010 LTE
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
 
11.greatway triple playproposal110422
11.greatway triple playproposal11042211.greatway triple playproposal110422
11.greatway triple playproposal110422
 
Beyond 100GE
Beyond 100GEBeyond 100GE
Beyond 100GE
 

More from F5 Networks

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesF5 Networks
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionF5 Networks
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersF5 Networks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015F5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)F5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 

More from F5 Networks (20)

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Leading performance to consolidate application delivery services

  • 1. BIG-IP 4200V ADC PLATFORM Leading performance to consolidate application delivery services October 2012
  • 2. BIG-IP 4200v Platform Consolidate App Leading Performance Enable SSL Growth Delivery Services BIG-IP 4200v delivers The 4200v is a purpose- BIG-IP 4200v enables you leading performance for built hardware platform with to encrypt all data mid-size enterprises, the processing power to transfers – without cloud and service deploy multiple impacting server providers application delivery performance services
  • 3. BIG-IP 4200v Leading performance to consolidate application delivery services • Target Market ‒ Mid-size enterprises, service and cloud providers • Leading Performance of Mid-Range ADC Platforms ‒ Highest application decisions per second ‒ Maximum SSL processing ‒ Hardware compression for reduced bandwidth utilization • Consolidate Application Delivery Services – Deploy traffic management, acceleration, security, and DNS services – Unified integrated platform on TMOS architecture • Enable SSL Growth ‒ Secure data in flight beyond logins and transactions – Offload processing from servers and reduce costs
  • 4. BIG-IP 4200v Key Features and Specs Intel Xeon Quad-core processor 16GB Memory Hardware Compression 80+ Gold Power Supply (Redundant PS option) Hardware SSL Offload 8x 1G ports 1U Rack Footprint 2x 10G ports Specs L7 Fast HTTP Inf/Inf 850,000 RPS L7/L4 Throughput 10 Gbps L4 Conn/s 300,000 CPS L4 HTTP RPS* 2.5M RPS SSL TPS(1K/2K Keys) 45,000/9,000 TPS (Max Included) SSL Bulk Throughput 8 Gbps HW Compression 8 Gbps (Max Included) TMOS Version v11.2.1 * New Metric
  • 5. BIG-IP Platform Line-up VIPRION 4480 VIPRION 2400 2.5M - 10M L7 RPS 1.4M - 5.6M L4 CPS 80G- 320G L4 TPUT 40G – 160G L7 TPUT 1M - 4M L7 RPS 400K - 1.6M L4 CPS 18G -72G/40G - 160G - L7/L4 TPUT 1 blade BIG-IP 11000, 11000F, 11050, BIG-IP 8900, 11050F 8900F, 8950, 2.5M L7 RPS BIG-IP 6900, 8950S 1M L4 CPS 6900F, 6900S Up to 1.9M L7 RPS Up to 42G TPUT BIG-IP 4200v 600k L7 RPS Up to 800K L4 CPS 850k L7 RPS 220K L4 CPS Up to 20G TPUT BIG-IP 3900 300K L4 CPS 6G L7/L4 TPUT 400k L7 RPS BIG-IP 3600 10G L7/L4 TPUT 175K L4 CPS BIG-IP 1600 135k L7 RPS 4G L7/L4 TPUT 115K L4 CPS 100k L7 RPS 2G L7/L4 TPUT 60K L4 CPS 1G L7/L4 TPUT 200M TPUT Designation after platform: F = FIPS S = Turbo SSL 1 G TPUT