Leveraging  F5  for Application Delivery<br />Shane Coleman<br />Field Systems Engineer, Wisconsin & Northern Illinois<br ...
Who Is F5 Networks?<br />Value Innovation<br /><ul><li> Unique TMOS architecture
 Industry’s only open iControl API & SDK
 Powerful iRules and DevCentral Community
 Numerous Industry Patents</li></ul>Proven Results<br /><ul><li> Over 16,000 Customers
 FY08 Revenue: $650 M  
 #1 in Advanced Platform ADC Market – Gartner
 SSL VPN Market Leadership Award – Frost & Sullivan</li></ul> FORTUNE'S 100 FASTEST-GROWING <br />Application Partnerships...
 Application partner tested and documented solutions
 F5 solutions in partner labs
 Cooperative Support Agreements </li></li></ul><li>2005<br />2009<br />1 – Gartner<br />ADC – Magic Quadrant1<br />
F5 Continues to be #1 in the Application Delivery Controller Market for Q2 2009<br />Q209 Gartner ADC Market Share<br />Q2...
Cisco:	22.5%
Citrix: 	12.5%</li></ul>Q209 ADC Market Share Revenue Leaders<br /><ul><li>F5: 	$89.8Million
Cisco: 	$53 Million
Citrix: 	$29.4 Million</li></ul>Q209 ADC Q/Q Revenue Growth<br /><ul><li>F5: 	2.1%
Cisco: 	-14.5%
Citrix: 	9.5%</li></ul>Q209 ADC Total Market Numbers<br /><ul><li>Revenue: $235.7Million
Q/Q Revenue Growth: -1.4%</li></ul>*Application Delivery Controller (ADC) Segment Includes: Server Load Balancing/Layers 4...
F5 Dominates in Advanced Platform ADC Segment for Q2 2 2009<br />Q209 Gartner Advanced Platform ADC Market Share<br />Q209...
Citrix: 		17.8%
Radware: 	10.3%</li></ul>Q209 Advanced Platform ADC Market Share Revenue Leaders<br /><ul><li>F5: 		$89.8 Million
Citrix: 		$29.4 Million
Radware: 	$17 Million</li></ul>Q209 Advanced Platform ADC Q/Q Revenue Growth<br /><ul><li>F5: 		2.1%
Citrix: 		9.5%
Radware: 	8.3%</li></ul>Q209 Advanced Platform ADC Total Market Numbers<br /><ul><li>Revenue: $165 Million
Q/Q Revenue Growth: -2%</li></ul>*Advanced Platform Segment Includes: ADCs that integrate several functions (typically mor...
Wisconsin Clientele<br />
Organizations Worldwide Trust F5 to Keep Their Businesses RunningIncluding 9 out of 10 of the world’s top financial servic...
Hardware Platforms<br />BIG-IP VIPRION<br />BIG-IP 8900<br />40 GbpsTraffic<br />32 M  ccps<br />200,000 TPS<br />16 GB Ma...
Delivering Applications is Complex<br />Availability<br />Efficiency<br />Growth<br />End-user<br />Experience<br />Securi...
Traditional Methods of Resolution<br />Multiple Point Solutions<br />Application<br />More<br />Bandwidth<br />Application...
F5 BIG-IP TechnologyTurn your infrastructure into an agile application delivery network<br />BIG-IP<br />Users<br />Applic...
Optimizations<br />F5’s Traffic Management Operating System<br />Leveraging Clustered Multiprocessing<br />iSessions<br />...
TMOS ArchitectureA unified system for application delivery <br />Applications<br />Users<br />Full Proxy<br />Server Side<...
Clustered Multi-Processing<br />Benefits of<br />Asymmetric Processing<br />Symmetric Processing<br />No Overhead of CPU C...
WAN Application Delivery ServicesSecure and optimize site-to-site<br />BIG-IP<br />BIG-IP<br />WAN<br />Firewall<br />Fire...
Improve Connections Starting from Client<br />EDGE Client <br />Smart reconnect feature <br />survives endpoint IP address...
Server Offload<br /><ul><li> Compression
 Dynamic Caching
 Content Spooling
OneConnect
 Rate Shaping
 Connection limit</li></ul>Application Acceleration<br /><ul><li> IBR (Dynamic Content Control)
 Multi-Connect
 Dynamic Linearization
 Dynamic Caching
 Dynamic Compression
Upcoming SlideShare
Loading in...5
×

Customer Highleveloverview

963

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
963
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
54
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Delivering IT apps is not a simple exercise. There are a lot of issues to figure out:How do I make sure the app is always available?How can plan for growth?How do I make sure the delivery is optimized for the best end-user experience?How do I secure the app?How can I make sure I’m using my resources (servers, bandwidth) efficiently?
  • There’s a better way – the Application Delivery Controller. It’s a platform designed specifically to solve these issues, by making decisions in your network to ensure that your applications are always fast, secure, and available. BIG-IP Local Traffic Manager is the market-leading application delivery controller. It load balances, secures, and optimizes application traffic, giving you the control to add servers easily, eliminate downtime, improve application performance, and meet your security requirements.
  • asymmetric multiprocessing (ASMP), which uses separate specialized processors for specific tasks (which increases complexity), and computer clustered multiprocessing (such as Beowulf), in which not all memory is available to all processors.
  • TDR-1 After TDR-2 has removed all previously transferred byte patterns, WANJet applies a second class of data reduction routines called TDR-1. While TDR-2 is optimized to enhance repeat transfer performance, TDR-1 is designed to improve first transfer performance through the use of advanced encoding techniques and dictionaries optimized for very small repetitive patterns.
  • When you’re delivering an application, you also have to worry about security. Again you have a few options – you can try to modify the application, you can put in point solutions, or you can use your ADC as a strategic point of control to secure both your applications and your data. BIG-IP LTM has a number of features that provide security at the application level.Resource cloaking and content security – Prevent error codes and sensitive content from being presented to hackersCustomized application attack filtering – search for and apply rules to block known application level attacksPacket filtering – L4 based filtering rules to protect at the network levelNetwork attack prevention – protect against DoS, SYN floods, and other network attacks while delivering uninterrupted service for legitimate connections.MSM (add-on module)PSM (add-on module)ASM (add-on module)A &quot;positive&quot; security model identifies scenarios with a known degree of trust, only allowing access to trusted resources. The positive model assumes that a new scenario is un-trusted, and requires that trust be assigned before access and usage is granted. In the classic positive security model, only known good requests and known good results are delivered.
  • Layer 7 DoS Protection – Block application DoS attacks and increase end-user application performance with accurate triggers and automatic controls. This is based on a detection element and three different prevention methods which are applied one after another for in-depth prevention measures and techniques.Brute Force Protection – Detect and mitigate high volume failed login requests. ASM monitors server responses and when it detects multiple login failures related to a Brute Force Attack, ASM slows the requesting browser down.
  • Let’s start with the first two issues for application delivery – how do I make sure the app is always available and plan for growth?  In the past, you could solve this with a simple load balancer. Spread the traffic among several servers and you’re done. But as applications get more complex, your method for load balancing has to keep up. You can’t just look at spreading traffic around, the load balancer needs to actually understand the application to distribute the traffic appropriately. LTM provides the advanced features you need to make application level decisions to direct users to the best possible resources.Static and dynamic LB methodsApplication health monitoring with specialized monitors for specific applicationsMultiple persistence methods (sticky sessions)Transaction insurance to inspect and respond to server and application errors
  • BIG-IP hardware is designed specifically for application delivery. Features such as hardware SSL, hardware compression, and multi-core processing enable BIG-IP hardware to deliver even the most demanding applications. Options for dual hard drives, dual power, and hot swappable components give you the highest reliability.
  • NOTE: The install will appear to hang at 87% for several minutes. This is normal.
  • Chances are you already implement administrative virtualization throughout your IT organization, but you probably don’t refer to it by this phrase.If you implement separate passwords for your root/administrator accounts between your mail and web servers, and your mail administrators don’tknow the password to the web server and vise versa, then you’ve deployed management virtualization in its most basic form. The paradigm can beextended down to segmented administration roles on one platform or box, which is where segmented administration becomes “virtual.” User andgroup policies in Microsoft Windows XP, 2003, and Vista are an excellent example of virtualized administration rights: Alice may be in the backupgroup for the 2003 Active Directory server, but not in the admin group. She has read access to all the fi les she needs to back up, but she doesn’thave rights to install new fi les or software. Although she is logging into the same sever that the true administrator is logs into, her user experiencediffers from the administrator. Management virtualization is also a key concept in overall data center management. It’s critical that the networkadministrators have full access to all the infrastructure gear, such as core routers and switches, but that they not have admin-level access to servers
  • Customer Highleveloverview

    1. 1. Leveraging F5 for Application Delivery<br />Shane Coleman<br />Field Systems Engineer, Wisconsin & Northern Illinois<br />s.coleman@f5.com<br />
    2. 2. Who Is F5 Networks?<br />Value Innovation<br /><ul><li> Unique TMOS architecture
    3. 3. Industry’s only open iControl API & SDK
    4. 4. Powerful iRules and DevCentral Community
    5. 5. Numerous Industry Patents</li></ul>Proven Results<br /><ul><li> Over 16,000 Customers
    6. 6. FY08 Revenue: $650 M  
    7. 7. #1 in Advanced Platform ADC Market – Gartner
    8. 8. SSL VPN Market Leadership Award – Frost & Sullivan</li></ul> FORTUNE'S 100 FASTEST-GROWING <br />Application Partnerships<br /><ul><li> Unique F5 and application vendor integration
    9. 9. Application partner tested and documented solutions
    10. 10. F5 solutions in partner labs
    11. 11. Cooperative Support Agreements </li></li></ul><li>2005<br />2009<br />1 – Gartner<br />ADC – Magic Quadrant1<br />
    12. 12. F5 Continues to be #1 in the Application Delivery Controller Market for Q2 2009<br />Q209 Gartner ADC Market Share<br />Q209 ADC* Market Share Leaders<br /><ul><li>F5 : 38.1%
    13. 13. Cisco: 22.5%
    14. 14. Citrix: 12.5%</li></ul>Q209 ADC Market Share Revenue Leaders<br /><ul><li>F5: $89.8Million
    15. 15. Cisco: $53 Million
    16. 16. Citrix: $29.4 Million</li></ul>Q209 ADC Q/Q Revenue Growth<br /><ul><li>F5: 2.1%
    17. 17. Cisco: -14.5%
    18. 18. Citrix: 9.5%</li></ul>Q209 ADC Total Market Numbers<br /><ul><li>Revenue: $235.7Million
    19. 19. Q/Q Revenue Growth: -1.4%</li></ul>*Application Delivery Controller (ADC) Segment Includes: Server Load Balancing/Layers 4-7 Switching and Advanced (Integrated) Platforms<br />Citrix<br />12.5%<br />Radware<br />8.8%<br />Cisco<br />22.5%<br />Others<br />18.2%<br />F5 NETWORKS<br />38.1%<br />SOURCE: Gartner<br />
    20. 20. F5 Dominates in Advanced Platform ADC Segment for Q2 2 2009<br />Q209 Gartner Advanced Platform ADC Market Share<br />Q209 Advanced Platform ADC* Market Share Leaders<br /><ul><li>F5: 54.4%
    21. 21. Citrix: 17.8%
    22. 22. Radware: 10.3%</li></ul>Q209 Advanced Platform ADC Market Share Revenue Leaders<br /><ul><li>F5: $89.8 Million
    23. 23. Citrix: $29.4 Million
    24. 24. Radware: $17 Million</li></ul>Q209 Advanced Platform ADC Q/Q Revenue Growth<br /><ul><li>F5: 2.1%
    25. 25. Citrix: 9.5%
    26. 26. Radware: 8.3%</li></ul>Q209 Advanced Platform ADC Total Market Numbers<br /><ul><li>Revenue: $165 Million
    27. 27. Q/Q Revenue Growth: -2%</li></ul>*Advanced Platform Segment Includes: ADCs that integrate several functions (typically more than four) on a single platform (for example, load balancing, TCP, connection management, SSL offload, compression and caching) <br />Radware<br />10.3%<br />Others <br />17.5%<br />Citrix<br />17.8%<br />F5 NETWORKS<br />54.4%<br />SOURCE: Gartner<br />
    28. 28. Wisconsin Clientele<br />
    29. 29. Organizations Worldwide Trust F5 to Keep Their Businesses RunningIncluding 9 out of 10 of the world’s top financial services firms and 60% of the Global 1000<br />Financial<br />Media<br />Other<br />IT<br />Transport<br />Telco/ISP<br />
    30. 30. Hardware Platforms<br />BIG-IP VIPRION<br />BIG-IP 8900<br />40 GbpsTraffic<br />32 M ccps<br />200,000 TPS<br />16 GB Max Compression<br />Multiple Product Modules<br />2 x Quad core CPU<br />16 10/100/1000 + 8x 1GB SFP<br />2x 320 GB HD (S/W RAID) + 8GB CF<br />16 GB memory<br />SSL @ 58K TPS / 9.6Gb bulk<br />8 Gbps max hardware compression<br />12 Gbps Traffic<br />Multiple Product Modules<br />BIG-IP 6900<br />BIG-IP 3900<br />2 x Dual core CPU<br />16 10/100/1000 + 8x 1GB SFP<br />2x 320 GB HD (S/W RAID) + 8GB CF<br />8 GB memory<br />SSL @ 25K TPS / 4 Gb bulk<br />5 Gbps max hardware compression<br />6 Gbps Traffic<br />Multiple Product Modules<br />BIG-IP 3600<br />2.4 GB encryption<br />3.8 Gbps software compression<br />Dual Power option<br />Quad Core CPU<br />8 GB memory<br />4 Gbps Traffic<br />Multiple Product Modules<br />BIG-IP 1600<br />Dual core CPU<br />8 10/100/1000 + 2x 1GB SFP<br />1x 160 GB HD + 8GB CF<br />4 GB memory<br />SSL @ 10K TPS / 2 Gb bulk<br />1 Gbps max software compression<br />2 Gbps Traffic<br />1 Advanced Product Module<br />Dual core CPU<br />4 10/100/1000 + 2x 1GB SFP<br />1x 160GB HD<br />4 GB memorySSL @ 5K TPS / 1 Gb Bulk<br />1 Gbps max software compression<br />1 Gbps Traffic<br />1 Basic Product Module<br />
    31. 31. Delivering Applications is Complex<br />Availability<br />Efficiency<br />Growth<br />End-user<br />Experience<br />Security<br />Application Architect<br />
    32. 32. Traditional Methods of Resolution<br />Multiple Point Solutions<br />Application<br />More<br />Bandwidth<br />Application Developer<br />Network Administrator<br />Add more infrastructure?<br />Hire an army of developers?<br />
    33. 33. F5 BIG-IP TechnologyTurn your infrastructure into an agile application delivery network<br />BIG-IP<br />Users<br />Applications<br />Optimizeyour Applications, Network and Client Connections<br />Secureyour Applications<br />Customizethe delivery of your Applications<br />ensure Scalable, Adaptable, Highly Available Applications<br />provideManageability to administrators<br />
    34. 34. Optimizations<br />F5’s Traffic Management Operating System<br />Leveraging Clustered Multiprocessing<br />iSessions<br />Optimizing at the Client<br />Benefit to:<br />Client<br />Network<br />Server<br />
    35. 35. TMOS ArchitectureA unified system for application delivery <br />Applications<br />Users<br />Full Proxy<br />Server Side<br />Client<br />Side<br />App Security<br />WAN Accel<br />3rd Party<br />Microkernel<br />Rate Shaping<br />TCP Express<br />SSL<br />Caching<br />XML<br />Compression<br />OneConnect<br />TCP Express<br />iRules<br />High Performance Hardware<br />iControl<br />
    36. 36. Clustered Multi-Processing<br />Benefits of<br />Asymmetric Processing<br />Symmetric Processing<br />No Overhead of CPU Context Switching<br />Load Balances processes across ALL Cores<br />
    37. 37. WAN Application Delivery ServicesSecure and optimize site-to-site<br />BIG-IP<br />BIG-IP<br />WAN<br />Firewall<br />Firewall<br />iSessions<br />Symmetric Adaptive Compression<br />SSL Encryption<br />Complete L7 QoS<br />TCP Express 2.0<br />Servers<br />Servers<br />iSessions secure, optimized connection between two BIG-IPs<br />
    38. 38. Improve Connections Starting from Client<br />EDGE Client <br />Smart reconnect feature <br />survives endpoint IP address change (such as AP hop) <br />detects domain changes for automatic VPN tunnel setup/teardown<br />Adaptive compression <br />effort level automatically dials up/down with server/CPU load)<br />Datagram TLS<br />optimizes traffic especially on lossy WAN connections and real time traffic<br />Client side traffic shaping<br />prioritizes sensitive applications (such as VOIP traffic )<br />
    39. 39. Server Offload<br /><ul><li> Compression
    40. 40. Dynamic Caching
    41. 41. Content Spooling
    42. 42. OneConnect
    43. 43. Rate Shaping
    44. 44. Connection limit</li></ul>Application Acceleration<br /><ul><li> IBR (Dynamic Content Control)
    45. 45. Multi-Connect
    46. 46. Dynamic Linearization
    47. 47. Dynamic Caching
    48. 48. Dynamic Compression
    49. 49. SSL Acceleration</li></ul>Acceleration Functional Areas and the Effect on Infrastructure<br />Page Generation Time<br />Page LoadTime<br />Page Delivery Time<br />Page Delivery Time<br />Internet WAN<br />10%<br /> 10%<br />Client Browser<br />ServerInfrastructure<br />Network Acceleration<br /><ul><li> Compression
    50. 50. Dynamic Caching
    51. 51. TCP Express
    52. 52. Differential Compression
    53. 53. QoS</li></li></ul><li>Security<br />Securing the Application & Data<br />Trust-Based Access <br />
    54. 54. Secure the Applications & Data<br />Industry Recognized<br />ICSA Certified<br />SC Magazine’s 2009 Best Web Application Security Solution<br />Simplified Administration<br />Rapid Deployment Policies<br />Automatic policy builder with templates<br />Flexible Architecture<br />Bridge or Routed<br />Blocking or Passive Modes<br />Strong Security<br />Protocol Anomaly Detection (DoS, Brute Force)<br />Full XML schema validation<br />Data Guard & Cloaking<br />Protocol Security for FTP, HTTP and SMTP<br />Forceful Browsing & Logical Flaw Mitigation<br />OWASP top 10 and “0 Day” Protections<br />
    55. 55. Secure the Applications and Data<br />Network and Protocol Attack Prevention<br />Resource Cloaking and Content Security<br />Positive & Negative Security Models<br />Selective Encryption<br />Security at Application, Protocol and Network Level<br />Meet compliance requirements (PCI, HPPIA, etc.)<br />Strong protection without interrupting legitimate traffic<br />“BIG-IP enabled us to improve security instead of having to <br />invest time and money to develop a new more secure application”<br />Application Manger<br />Global 5000 Media and Entertainment Company<br />TechValidate 0C0-126-2FB<br />
    56. 56. Adaptive Application SecurityUnique Attack Detection, L7 DoS and Brute Force Protection<br />Remediate unwanted clients while servicing desired clients<br />Improved application availability <br />Focus on higher value productivity while automatic controls intervene<br />
    57. 57. Provide Trust-Based Access<br />User Trust:<br />LDAP<br />Windows Domain<br />Active Directory<br />Radius<br />Single Sign On<br />Two-Factor Auth<br />Client Side Certificates<br />The EDGE is Fluid!<br />Resources / Applications<br />Access Policy Manager (APM)<br />Corporate Network<br />Internet<br />Access and Control<br />Network Access<br />Web Application Access<br />Role Based Access Control<br />L4, L7 ACLs<br />Integration with 3rd Party IAM vendors<br />Device Trust:<br />Antivirus<br />Personal Firewall<br />Files and Registry Settings <br />OS & Browser Patches<br />Trusted IP<br />REMEDIATION – When End Point Scan Fails<br />Manageability<br />BIG-IP GUI, tmsh, iRules, iControl<br />Visual Policy Editor – Easy to Build & Maintain end point security access policies<br />Role Based Admin – admin access based on organizational role<br />End User Experience<br />WAN Optimization and Web Acceleration<br />Standalone Client<br />Web based Client<br />
    58. 58. Customization of Application Delivery<br />iRules<br />iControl<br />
    59. 59. Customize your Delivery with iRules<br />Programming language integrated into TMOS<br />TMOS (Traffic Management Operating System)<br />Based on industry standard TCL language<br />TCL (Tool Command Language)<br />Inbound or outbound traffic can be:<br />intercepted<br />inspected<br />transformed<br />directed<br />tracked<br />0101010101010101010101010101010101010101010101010101010101010101<br />
    60. 60. Connect with 40,000 ADC ExpertsAt DevCentral<br /><ul><li>Blogs
    61. 61. Multimedia
    62. 62. iRules and iControlsamples
    63. 63. Forums
    64. 64. Tutorials
    65. 65. Tools</li></ul>http://devcentral.f5.com<br />
    66. 66. iControl<br /><ul><li>Open API
    67. 67. DLL in Visual Studio</li></ul>Web Client<br />Web Client<br />Web Server Virtualization<br />BIG-IP<br />iContol<br />Web Server<br />Web Server<br />Web Server<br />Application Server Virtualization<br />BIG-IP<br />iContol<br />App. Server<br />App. Server<br />App. Server<br />Storage Virtualization<br />Storage<br />Storage<br />Storage<br />
    68. 68. Available, Scalable & Adaptable Applications<br />Load Balancing<br />Hardware <br />Resilience<br />Stateful, High Availability<br />Blade-based capabilities<br />Adaptability with Dynamic Infrastructure Concepts<br />
    69. 69. It Starts with Load BalancingEnsure availability and plan for growth<br />8 Dynamic LB<br />Methods<br />Application Health Monitoring<br />High Performance<br />Hardware<br />Session Persistence<br />TransactionAssurance<br />LTM load balances at the application level<br />Ensures the best resources are always selected<br />Has deep visibility into application health<br />Proactively inspects and responds to errors<br />Eliminate downtime and scale the application<br />
    70. 70. Intelligent Monitoring: Monitor real traffic instead of probing<br />In-Band Monitors <br />Monitor is based on live traffic connections<br />Detects true state of application without active monitor overhead<br />Alleviates active monitors constantly sending traffic to the servers; catches downed nodes in between the active monitor probe internals<br />Marks node down after pool member does not respond to a connection within a certain amount of time<br />Can automatically attempt to send a connection to a downed node<br />Can only force the active monitor to be used for probing if the passive monitor detected the node as down<br />01010101010101010101010101010101010101010101010101010101010101010<br />
    71. 71. Offering Resiliency & High Availability<br />Hardware designed specifically for Application Delivery<br />Industry’s best performance – up to 40 Gbps throughput<br />Hot-Swappable Components<br />Flexible deployment options – FIPS, NEBS, DC power<br />Always-on Management<br />All Hardware supports intelligent High Availability<br />Stateful Failover for session-based applications<br />
    72. 72. Dynamic Infrastructures using VMWARE / F5<br />Matching Network Automation with Computer Resource Automation<br />Demand ↑ ↑ ↑<br />Web Clients<br />Web Clients <br />Monitoring & Management<br />Frontends Virtualization<br />Detection<br />BIG-IP LTM<br />iControl<br />Automation<br />VM Provision<br />Frontend<br />Frontend<br />Frontend<br />vCenter<br />+<br />AppSpeed<br />F5 Provision<br />AppServers Virtualization<br />BIG-IP LTM<br />iControl<br />Demand ↓ ↓ ↓<br />Detection<br />App. Server<br />App. Server<br />App. Server<br />Storage Virtualization<br />Automation<br />F5 Deprovision<br />VM Deprovision<br />
    73. 73. Global (Site) Adaptability<br />Data Center Asia<br /> Data Center North America <br />ISP-2<br />ISP-1<br />Firewalls<br />BIG-IP <br />Firewalls<br />BIG-IP <br />Internet<br />Data Center Europe<br />Firewalls<br />BIG-IP <br />Leverage Global DNS capabilities within BigIP<br />
    74. 74. Manageability<br />GUI<br />Application Templates<br />Software Installation<br />Resource Provisioning<br />Virtualized Management<br />Routing Domains<br />Certificate Management<br />Centralized Management Capabilities<br />
    75. 75. Simplified ManagementXMUI GUI scales and provides user friendly, intuitive console<br />
    76. 76. Simplified ManagementDashboard<br />
    77. 77. Simple Application Roll-outsCustomizable Application Templates<br />1<br />
    78. 78. Simple Application Roll-outsApplication Templates<br />2<br />
    79. 79. Templates Engineered With CollaborationEnsuring best-practice deployments<br />F5 Solution Center<br />Successful<br />Deployments<br />
    80. 80. Management – Software and Image Control<br />Create Volumes for Boot Partitions<br />
    81. 81. Staging & Confirming the Installation<br />
    82. 82. Installation progress<br />Once the install has completed, simply click on any link in the GUI to navigate away from the page<br />
    83. 83. Boot to the new installation<br /><ul><li>Unlike previous versions of BIG-IP selecting a new boot location is immediate and does not just set the boot location preference for the next boot
    84. 84. If you click this the link for a different boot location you will be prompted for confirmation, then the system will boot into the selected boot location</li></li></ul><li>Resource provisioning<br />
    85. 85. Management Virtualization<br />Driving forces: <br />Regulatory, Best Practice<br />Benefits: <br />Compliance, Reduce Configuration Errors<br />F5 Management Virtualization<br />Partition Virtualized Servers, Resources and Monitors<br />Limit Roles within the Partitions<br />
    86. 86. Routing Domains<br />DomainA<br />10.10.10.0<br />10.10.20.0<br />DomainB<br />10.10.30.0<br />10.10.40.0<br />DomainC<br />10.10.50.0<br />10.10.60.0<br />Isolated Routing Domains<br />Independent Default Gateway’s and Routing Tables<br />Overlapping IP Address Networks Supported<br />
    87. 87. Certificate Management<br />Easily import existing certificates<br />Create new certificates<br />Leverage wildcards to minimize certificate costs<br />Notification of upcoming certificate expiration<br />
    88. 88. Enterprise ManagerManageability & Visibility<br />Datacenter 1<br />Data Center 2<br />Capabilities<br />IT Staff<br />IT Staff<br />IT Staff<br />IT Staff<br /><ul><li>Historical collection of application traffic statistics for trending and analysis
    89. 89. Capacity planning as well as trending and historical analysis
    90. 90. Opportunities to effectively plan with Business Units
    91. 91. Central Policy Management & Deploiyment</li></ul>IT Staff<br />IT Staff<br />IT Staff<br />IT Staff<br />Web<br />Web<br />SharePoint<br />Exchange<br />Web<br />SharePoint<br />Exchange<br />Accounting<br />Real-time<br />Monitors<br />ADC<br />ADC<br />ADC<br />ADC<br />ADC<br />ADC<br />ADC<br />ADC<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×