Soluções F5 Networks - FORENSE Tecnologia

956 views

Published on

Soluções de disponibilidade, segurança e otimização, todas com consultoria e suporte da equipe FORENSE Tecnologia.
Contato - dtoledo@forense.net.br

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
956
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • F5 is the global leader in Application Delivery Networking, and continues to be a solid provider and customer ally as we continue to grow and expand the entire ADC market.
  • F5 makes the connected world run better. This statement defines our singular goal in providing integrated application delivery services, and we do that across a broad scope of vertical industries with deep penetration in those markets. Such as: 8 of the Fortune 10 companies44 of the Fortune 50 companies18 of the top 20 U.S. commercial banks3 of the top 3 U.S. securities companies6 of the top 6 healthcare companies: pharmacy and other services5 of the top 5 U.S. airlines8 of the top 10 U.S. insurance companies - property and casualty10 of the top 10 fixed and mobile global service providers15 of the 15 executive branches of the US government 6 of the top 10 U.S. Online Video Destinations16 of the top 20 cloud infrastructure and Web hosting companies
  • What are the challenges that see every day, that our customers – IT decision makers, application architects, network administrators – face throughout their entire IT infrastructure? Device growth at exponential levels means more devices in the Enterprise. These devices bring with them new challenges with management, application delivery, security, and a huge amount of new personal and professional apps from end-users. For the first time in history, people are dictating which apps they use in the Enterprise, and yet IT still has to deal with how to deliver data to mobile users. These are the issues that are keeping IT administrators and decision makers awake at night.
  • And the day to day reality for IT who is tasked with managing these new technologies is that traditional application management solutions fail to address the new application delivery model. Many IT shops think that a standard firewall and a simple ADC will be enough to grow the infrastructure.
  • But unfortunately the infrastructure will very quickly outgrow the standard firewall and ADC solutions. As new applications come under IT management, such as SaaS and cloud computing – technologies that were designed to offer services directly to users and not be managed on-premise – the challenges of user management, application performance and availability, and security don’t go away. In fact, SaaS and cloud computing bring new challenges to IT: How do you apply application access and performance policies to applications that are outside of the data center? Firewalls and simple ADC’s don’t solve the problem of managing more endpoints, more delivery models, and more applications in more locations.
  • In order to address changes impacting customers, a new, more sophisticated model needs to replace the standard firewalls and simple ADC’s: an Intelligent Services Platform is the key to managing application delivery in the new world of on- and off-premise applications accessed by users with multiple devices. An Intelligent Services Platform manages users from any location on any device, applies application delivery policies to all application requests in both directions, and connects them to applications regardless of where the application lives. There is no way to manage mobile device and application growth simultaneously without an Intelligent Services Platform acting as a full proxy between the users and applications.
  • How does F5’s full proxy provide a complete, integrated Intelligent Services Platform? Application Awareness: Total insight into how the application is supposed to look on the wire. User Awareness: Ability to see which users are trying to access what application from which devices.Resource Awareness: Tying all pieces of the application delivery infrastructure together to provide real-time visibility into the entire Application Delivery NetworkTogether, application, user, and resource awareness come together to provide Strategic Awareness: application delivery awareness at the strategic point of control on- and off-premise.
  • Not just a proxy, but as a full-proxy F5 maintains two separate pieces of data for every session between a client and an application – one on the client-side, one on the server-side. There is effectively an “air gap” isolation layer between the two internal to the proxy, one that enables focused profiles to be applied specifically to address issues peculiar to each “side” of the proxy. A proxyturns a two-party session into a four-party session, with the middle process emulating the two real hosts.
  • …but it’s not just a full proxy that enables a complete intelligence services platform. A platform that’s able to offer complete application delivery services starts with a full proxy, a full proxy built on top of hardware and software alike, but then extends throughout the platform to offer: Integrated services for all Enterprise applicationsManagement and control across the entire Application Delivery NetworkThe industry’s largest and strongest community of application and network developersOnly a completely integrated Intelligent Services Platform from F5 provides discreet services throughout the Application Delivery Network -- such as mobile optimization and application access management, total DNS delivery services, application delivery firewall – in one unified platform.
  • Enterprise customers are concerned with maintaining control over applications as they move around and out of the data center, making sure those applications always remain Fast, Available, and Secure. And although these are all three equally important, they all impact the applications and the infrastructure yet each can require unique solutions. F5’s Integrated Intelligent Services Platform delivers a single platform that still offers unique solutions targeted towards specific application needs of the enterprise.
  • We all want applications to be Fast, but what does application performance really mean for the bottom line?When we moved our Microsoft application servers behind the BIG-IP LTM devices, we immediately noticed a dramatic performance improvement—the difference was like night and day. The performance of those servers was very noticeable—and not just with SharePoint, but with all of our applications at all of our sites.Source:“Nearly 60% of web users say they expect a website to load on their mobile phone in 3 seconds or less and 74% are willing to wait 5 seconds or less for a single web page to load before leaving the site.”– Compuware report,“What Users Want from Mobile,” July 2011Source:Every 100ms delay costs Amazon 1% in sales.– Greg Lindon, Amazon
  • Application Availability is probably the paramount concern of any Enterprise application roll-out. If an application becomes unavailable, all users and services are impacted by the loss of access. An application needs to be up before it can be optimized and secured. And don’t forget about application availability in the cloud. Most public cloud providers don’t have solid SLA’s and don’t offer extended services such as dual-stack IPv4/IPv6 environments. Source: “Cloud-based DR has the potential to give companies lower costs yet faster recovery, with easier testing and more flexible contracts” Rachel Dines, Senior Analyst, Infrastructure & Operations, at Forrester Research in Cambridge Massachusetts   Source: “A new set of customers. There is a large, untapped customer base in Asia that connects with IPv6-only devices and can only communicate with IPv6 hosts.”Forester, Andre Kindness, Opening New Doors With IPv6, February 18, 2011
  • Attacks against applications continue to rise exponentially every year, and they continue to diversify across application types and attack styles. Different types of attacks come in and out of favor as attackers find new ways to exploit the application or infrastructure and reactive solutions are brought to market to block those types of attacks. To successfully protect against attacks against the applications, a proactive approach needs to be deployed that protects both the application and infrastructure it uses alike, including when an application moves to the cloud. F5’s integrated Intelligent Services Platform protects all parts of the application delivery network, from the edge, to the infrastructure, and the application. F5 solutions also sit directly in front of the application providing protection wherever the application is deployed. Source: “71 % of surveyed Internet, technology and social experts predict most work will be done via web-based or mobile applications by 2020.”Pew Internet and American Life Project
  • F5’s powerful solutions across the Application Delivery Network come from a completely integrated platform, a platform that’s designed from the ground up for complete ADN management solely to make application Fast, Available, and Secure. Application Fluency and Scale: The F5 Integrated Services Platform starts with hardware and software designed to deliver applications. The hardware and software components work together to provide complete control and are designed to scale up in the data center and out to off-premise locations like the cloud. Unified Services: There are many point products on the market that try to solve one singular problem at one location in the data center. But point products aren’t capable of addressing all application delivery services at once, nor do they have the deep visibility across the entire infrastructure to understand how to manage application delivery from the app down to the end-user. Unmatched Programmability: Although F5’s Intelligent Services Platform already knows how to manage application delivery in thousands of scenarios, every customer environment is always unique. F5 devices are fully programmable and configurable to match the unique challenges that each customer requires. This allows customers to manage F5 devices in their own environment.
  • Now let’s take an opportunity to dig into what it takes to deliver Fast, Available, and Secure applications with F5’s Intelligent Services Platform.
  • We mentioned earlier a statement by Amazon, “Every 100ms delay costs Amazon 1% in sales.”. Poor performance is a measurable cost to business. But with new versions of applications, or even patches, being rolled out regularly, with diversity in remote device requirements and the changing requirements of mobile networks, not only is it very expensive to continue streamlining applications but also very time consuming.
  • F5’s approach is to improve Server Capacity, Bandwidth utilisation & App response time. Its important to to look at all of these delivery aspects. Simple point solutions can be more of an inhibitor than an integrated, holistic solution.
  • Faster user experience = more time spent on page. Server operating systems have generic network stacks. This is because at the time of release there is no way to determine the environment in which it will be deployed. Fast LAN, Slow WAN, Mobile Network? Who knows?  Reduce the amount of back end servers. Reduce application load from servers and the networkImprove the user experience
  • Faster user experience = more time spent on page. Server operating systems have generic network stacks. This is because at the time of release there is no way to determine the environment in which it will be deployed. Fast LAN, Slow WAN, Mobile Network? Who knows?  Reduce the amount of back end servers. Reduce application load from servers and the networkImprove the user experience
  • Deliver the right content to the right device for the right user experience. A smart phone has a much smaller screen than a desktop or laptop computer. But web applications aren’t developed on smartphones and hence the apps resources are rarely optimized for the mobile delivery. Furthermore, they are rarely tested over mobile networks to see the impact 3G/4G networks have on how the service is consumed. F5’s Intelligent Services Platform understands the intricacies of these variables and optimizes content during delivery. It does this to ensure that the ideal format of resources are used whatever the circumstance. A Mobile devices gets a reduced image sized, perfect for viewing and a smaller device/smaller screen, compared to a laptop on a fixed network. The right tools for the right job. Optimize delivery of any application content to any deviceImprove user experience through dynamic image optimization Reduce amount of data over the network
  • Business tools like Microsoft Exchange, Oracle E-Business, and custom enterprise applications are expensive to implement and maintain. This becomes highly visible when user uptake of a new service is low. Poor performance of a new application impedes user productivity and is the most common cause of new service take up. F5:Helps improve employee productivityConsolidates back-end servicesImproves performance without recoding apps
  • With Web 2.0 brought complicated Applications made up of numerous services. Some organisations boasting 100’s of different services utilised to make up a single portal. But with this rich information comes more problems to solve. No longer do all the services reside in a controlled, private datacentre. Now we have services coming from SaaS providers, distributed Cloud models, etc. Optimisation must now be evaluated in an Inter-DC, Inter-Cloud fashion.
  • offload processing-intensive tasks from your servers, manage how your users connect to your data center, reduce the overall amount of traffic on your network.
  • Business Continuity and one DC goes down and failover either whole DC or just individual apps/servers. L2 connectivity: BGP is all or nothing. Based on ASN. Users’ request for application goes toLocal DNS Name Server who requests thru GTM, providing:Manageable and predicable data center utilizationEasily integrates into existing infrastructureSupports 1M queries/secGTM scalesto support the challenging events – floods, earthquakes, fires – that happen. GTM enables many options to transition to backup datacenters. Integration/OptionsActive: PassiveActive: ActiveActive: DR onlyRatio or Availability (Response Time) Split
  • Encryption, Caching and Compressions are all CPU intensive tasks. Tasks that fight the application itself for access to CPU time. And with virtualization, and the nature of Hypervisors, providing a Virtual CPU queuing system, we have multiple Virtual Machines all fighting against each others demands for CPU intensive tasks. Offloading the services to an integrated Intelligent Services Platform free’s that time sensitive queue to processing, leaving the Hypervisor to focus on Application Specific processing.  The result being a decrease in the number of physical servers, an increase VM density and an improvement in performance.
  • Virtualization kicked off a number thought changes in the data center. One of these being the move from Active-Standby DC’s to Active-Active. Some of the many great benefits of Active-Active are:De-risking disaster recovery: knowing both DC’s are already live and delivering applications eliminates the ‘what if’ fears of failover. No-more “will it work?”.Workload distribution: heavily utilized connectivity creates latency, which translates to poor end user experience. Distributing workloads across DC’s based on real time demand flattens the impact of peak times. Higher priority services can be drawn away from lower priorities. But these examples are only possible with fast, consistent performance between data centers. Services/data migration, for whatever reason it is initiated, musn’t be a point of weakness.A successful Active-Active implementation requires that inter-DC connectivity deliver’s:A reduction in data between Data Centre’s and optimized bandwidthImproved data replication.Improve RTO The solution is optimized WAN connectivity between multiple DC and cloud locations.
  • Application Availability is probably the paramount concern of any Enterprise application roll-out. If an application becomes unavailable, all users and services are impacted by the loss of access. An application needs to be up before it can be optimized and secured. And don’t forget about application availability in the cloud. Most public cloud providers don’t have solid SLA’s and don’t offer extended services such as dual-stack IPv4/IPv6 environments.
  • In 2011, public and private cloud drive 15% of IT spending. Worldwide Private Cloud deployments are projected to increase to over 1.1 billion by 2014 So cloud adoption is very real. But with it comes some problems. And many of these problems come from trying to achieve all of the dynamic greatness that Cloud should deliver. According to NIST (National Institute of Standards and Technology) these are “essential characteristics “of Cloud:On-demand self-serviceBroad network accessResource poolingRapid elasticityMeasured service So, how do we deliver on them?
  • Agility comes from Programmability and Extensibility in the network. And from this we get a scalable infrastructure, application mobility and Software-enabled services.
  • The ability to scale infrastructure on-demand allows for the freeing up of resources for use by other services. In short, you can dynamically spec the required resources based on real time demand. Versus spec’ing resources based on worst-case requirements. The latter, a model that brings with it significant waste. The key to success is the intelligence in measuring when to scale safely. Many organizations still use server CPU & RAM utilization as a gauge of application performance. F5’s integrated Intelligent Services Platform measures the End user experience. This information is passed to the cloud infrastructure platforms resulting in end-user experience driven data center workflows. Integrating F5 with leading cloud infrastructure platforms enables you to: Employ automatic provisioningScale on demandIntegrate with management platforms
  • Scale out to the cloud as demand for application resources spike.  Moving to a Cloud model should deliver simplification and ease of use over what we’ve experienced in the past. Implementing Cloud successfully is more than Pay-as-you-Go hypervisor rental w/ some management tools. It should provide an extension to your existing data centre’s. An increase in commodity resources when needed. And this model is very attractive to organisation that want to increase datacentre utilisation. The adoption of virtualisation took many from averages of sub-10% utilisation to more cost effective values ranging from anything like 30 – 50% at peak time. Sweating the infrastructure further requires workload agility like Cloud Bursting. The ability for the infrastructure to see when resource consumption has reached a level whereby the end user experience is beginning to see impact. Data centre agility, by means of an integrated Intelligent Services Platform, allows for the private datacentre to dynamically extend its workloads into a cloud provider to consume extra resources. And, equally, to retract workloads from cloud providers when workloads decrease.
  • F5’s Intelligent Services Platform delivers the ability to route user requests to applications or workloads that reside in multiple clouds. This with the workload visibility and agility of a private datacenter deployment delivering: workloads to the nearest cloud provider for better performancegranular user control and management to remote resources no matter their location, or xaaS provideradopt cloud effectively without adding risk
  • Many have invested in server virtualisation without realising the returns they had expected. As often with new technologies come new problems:Virtual machine creep - VM’s created, powered on and forgotten about.Shared architecture adding complexity to security – virtual and physical devices co-existing.Lack of network agility/integration stalling what should be faster deployment times
  • To reach the full potential of server and desktop virtualisation, the network must deliver consistency, programmability and extensibility. Furthermore, offloading services like encryption, compression and caching to improve Virtual Machine density.
  • VDI / RDP – Customers can improve the scale and reliability of their VDI / RDP deployments, while also simplifying VDI infrastructure. Users benefit from SSO, single namespace, acceleration, and a single user portal for both VDI and all other applications. Improves scale / reduces complexity of VDI/RDP deploymentsSSO, single namespace, acceleration, and single user portalPresent OWA, VMWare View next to Citrix Apps in Portal ModeImproved scale and reliabilityBetter user experience + SSOSimplified deploymentImproved quality of real-time applications
  • SDN will greatly improve the management of Layer2/3 solutions – switching/routing/network firewalls. But it falls short on the when & why to implement a workflow. The DC infrastructure is built to host and delivers services to their respective consumers. Consequently, its only with knowledge of and integration into these services that SDN can deliver value. The service visibility derived from F5’s Integrates Services Platform is key to: Bring application awareness to an SDN Infrastructureflexibility to add and extend new SDN servicesIntegrate with existing SDN solutions from VMware and Microsoft. 
  • With co-existing IPv4 and IPv6 networks, add to this the complexity added to DNS to handle it. Then bring in remote networks with overlapping address ranges. And we’ve only talked about IP so far. Migrating from native HTTP to SPDY will require them to co-exist. Then there’s the fact that delivering the same application via a mobile provider, 3G, 4G, LTE, requires a different delivery strategy than for desktops/laptops because of the nature of these protocols.
  • One size fits all application delivery architectures don’t scale. The network needs intelligence in both understanding the different types of behaviours that are required by various devices and networks and when to apply them for the best performance and service resilience.
  • Consider a transport company contracted to takes boxes from one location, lets say New York, to another location, this could be Singapore. The checks and processes in place might ensure almost guaranteed success in delivery of these boxes but what if the boxes contained the wrong goods. Now apply this same logic to Application Delivery. If network has no concept of services and their consumers, how they differentiate in behaviour and requirements, then how will it know whether its delivering errors or the intended data? How will it know if its delivering a 404 Page Not Found or a 503 Gateway Timeout? It wouldn’t. it would deliver these errors as fast as efficiently as it could.F5’s Intelligent Services Platform does differentiate between right and wrong. It adhere’s to the business values of brand protection and takes its instruction from the business owner. F5’ s Intelligent Services Platform:Monitors and analyses application and network healthAchieves real time application availability and fail-overDelivers application visibility and scale for capacity and troubleshootingStats that are availableServer LatencyPage Load TimeThroughputResponse CodesMethodsURLsClient IPsClient GeographicUser AgentUser SessionsCPUMemoryDNS
  • Route users to the best location based on application availability and performance Route user to most available locationMonitor application services globallyDeploy automatic disaster fail-over with minimal downtimeStats that are availableServer LatencyPage Load TimeThroughputResponse CodesMethodsURLsClient IPsClient GeographicUser AgentUser SessionsCPUMemoryDNS
  • Doubling the number of IP Networks in your Data Center is a daunting concept. But it can be simple. F5’s Full Proxy Architecture allows for the seamless translation between IPv4 & IPv6.Allow traffic to travel freely between IPv4 and IPv6 networks Support any device or any networkDynamically translate and proxy between bothAchieve zero friction migration
  • Doubling the number of IP Networks in your Data Center is a daunting concept. But it can be simple. F5’s Full Proxy Architecture allows for the seamless translation between IPv4 & IPv6.Allow traffic to travel freely between IPv4 and IPv6 networks Support any device or any networkDynamically translate and proxy between bothAchieve zero friction migration
  • Seamlessly translate application protocols between user devices and data center resources to: Translate between multiple application protocolsAvoid rewriting applicationsBenefit from support for 3600 application protocols natively This is this kind of thing we refer to at F5 when we talk about context. Understanding that resources and consumers don’t necessarily plug straight in to each other.
  • Seamlessly translate application protocols between user devices and data center resources to: Translate between multiple application protocolsAvoid rewriting applicationsBenefit from support for 3600 application protocols natively This is this kind of thing we refer to at F5 when we talk about context. Understanding that resources and consumers don’t necessarily plug straight in to each other.
  • Message data is what tells us the ‘who and where’ a transaction is coming from. It also tells us where it thinks it should go. F5’s Intelligent Services Platform taps into these messages bringing flexibility and control. A single namespace like xyz.com can be presented to the consumer where the F5 Big-IP understands that xyz.com/b2b might be a completely different resource, potentially in a different physical location. What is important here is that the complexity of everything ‘behind the scenes’ is abstracted from the consumer. F5 optimizes traffic management decisions based on contextual message data to: Translate between multiple application protocolsAvoid rewriting applicationsSupport for 3600 application protocols natively
  • Attacks against applications continue to rise exponentially every year, and they continue to diversify across application types and attack styles. Different types of attacks come in and out of favor as attackers find new ways to exploit the application or infrastructure and reactive solutions are brought to market to block those types of attacks. To successfully protect against attacks against the applications, a proactive approach needs to be deployed that protects both the application and infrastructure it uses alike, including when an application moves to the cloud. F5’s integrated Intelligent Services Platform protects all parts of the application delivery network, from the edge, to the infrastructure, and the application. F5 solutions also sit directly in front of the application providing protection wherever the application is deployed.
  • Your workforce is on the move, as are the critical business applications they rely on to stay productive. Delivering high-performance apps to mobile and remote users—many of whom are bringing their own devices to the network—requires dynamic, flexible, and powerful security.
  • The demand for user access to applications and data from any device and any location puts your corporate resources at risk. With access security from F5, you get centralized, flexible access policy control that provides comprehensive protection and keeps users productive. Manage access control efficiently while accelerating application access for your mobile workforce up to 5x.
  • Today’s mobile users want to access corporate resources from their own devices, but this can compromise security. Access solutions from F5 make it easy to implement and control bring-your-own-device (BYOD) policies for users who are constantly on the move. Extend enterprise data and applications to mobile devices securely—and ensure accelerated application access for all mobile users. Make it easy and secure for employees to use their personal devices: Ensures connecting devices adhere to baseline security postureReduces the risk of malware infecting the corporate network Solaris  RadiusWindow  ADNovel  LDAP
  • Traditional SSL VPN and client-based access solutions lack flexibility and scalability—and performance often can’t keep pace with demand. F5 unified access solutions combine SSL VPN remote access with acceleration and optimization services to provide high-performance, flexible, and scalable access security on a single platform.Give employees secure, fast access to resources regardless of where they areEnsures connecting devices adhere to baseline security postureReduces the risk of malware infecting the corporate networkSolaris à RadiusWindow à ADNovel à LDAP
  • These days, users, applications, and even data centers are located outside the traditional business perimeter—increasing the complexity of managing access to your corporate resources. F5 unified access solutions make it easier to manage global access from a strategic point of control. Protect your public-facing applications, ensure that users have secure remote access to corporate resources from any device, and enjoy the peace of mind that comes with full IPv6 support. Enable simplified and secure web application access to employees. Web Access Management – BIG-IP proxies the customer’s web applications and provides authentication, authorization, endpoint inspection, and more – all typing into Layer 4-7 ACLS through F5’s easy-to-use Visual Policy Editor.
  • Deploying Microsoft Exchange and SharePoint on your network can be costly and labor-intensive. But you can secure and accelerate the process using F5 unified access solutions. Custom-built policies and profiles for Exchange and SharePoint can help improve application performance by 5x, while reducing bandwidth consumption by 30x.Improve migration to Exchange 2012 while getting secure access across devices and locations.Exchange / Active Sync – The application Access solution helps secure Exchange deployment across Active Sync / Mobile, Outlook Web Access and Outlook Anywhere. In addition to access control and security, F5 can aid in disaster recover, Exchange 2007 to 2010 migration and provide single namespace capabilities. Secures Active Sync / Mobile, OWA and Outlook AnywhereAssists in disaster recovery and Exchange 2007 to 2010 migrationMigrate over time Authenticate usersSingle URL accessManaged accessAfter migrationScale to 60K usersNo cross-CAS overhead High availability
  • Desktop virtualization delivers anywhere access to your users while also making centralized management and security possible for your IT department. However, creating the virtual desktop infrastructure (VDI) necessary for desktop virtualization comes with a unique set of challenges for your network. F5 provides solutions that can optimize, accelerate, secure, and integrate with major VDI solutions—so you can support all your users, from any location, on any device.Deliver VDI just like an application while giving users fast, flexible access.VDI / RDP – Customers can improve the scale and reliability of their VDI / RDP deployments, while also simplifying VDI infrastructure. Users benefit from SSO, single namespace, acceleration, and a single user portal for both VDI and all other applications. Improves scale / reduces complexity of VDI/RDP deploymentsSSO, single namespace, acceleration, and single user portalPresent OWA, VMWareView next to Citrix Apps in Portal ModeImproved scale and reliabilityBetter user experience + SSOSimplified deploymentImproved quality of real-time applications
  • F5 unified access solutions make it easier and more cost-effective to manage global access—by giving you a strategic point of control. Protect your public-facing applications, ensure that users have secure remote access to corporate resources from any device, and enjoy the peace of mind that comes with full IPv6 support.Use F5 solutions to create a single policy for all access methods, or create unique policies depending on access method, device, user group, or other criteria. The F5 Visual Policy Editor simplifies policy administration, resulting in secure web portals and application tunnels that provide dynamic access to networks and applications. And the unparalleled scale and performance of F5 solutions ensure that you are investing in a platform for growth.Consolidate infrastructure, eliminate redundant tiers, simplify management, and reduce CapEx and OpEx by integrating F5 solutions with your current authentication infrastructure. With centralized AAA control, you can apply repeatable access policies across many applications and servers while getting a complete view of your authorization infrastructure.Get Kerberos single sign-on across a multitude of applications - no more multiple passwords to remember:VDI / RDP – Customers can improve the scale and reliability of their VDI / RDP deployments, while also simplifying VDI infrastructure. Users benefit from SSO, single namespace, acceleration, and a single user portal for both VDI and all other applications. Improves scale / reduces complexity of VDI/RDP deploymentsSSO, single namespace, acceleration, and single user portalPresent OWA, VMWareView next to Citrix Apps in Portal ModeImproved scale and reliabilityBetter user experience + SSOSimplified deploymentImproved quality of real-time applications
  • Attacks on applications—such as multi-layer DDoS attacks, SQL injection vulnerabilities, and JSON payload violations in AJAX widgets—pose serious new security threats. The risks to your interactive web apps, your data, and your business are increasing.
  • F5 provides a flexible, certified web application firewall and a comprehensive, policy-based web application security solution that eliminate the need for multiple appliances and address emerging threats at the application level. This complete solution lowers maintenance and management costs, and reduces the risk of damage to your intellectual property, data, and web applications.
  • Prevent scanners from screen scraping – competitors!Defend against malicious activity and web attacks: BenefitsDetect anomalous browsing activityBlock bots looking for exploitsBlock “scraping”- bots stealing intellectual property
  • Your applications and data face new threats from attacks that pose increasing risks to your business. F5 provides a flexible, certified web application firewall and comprehensive, policy-based web app security to address emerging threats at the application level. The F5 solution lowers maintenance and management costs, and increases the confidentiality, availability, and integrity of your apps, network, and processes. Proactively secure all web applications from current and future threats: Design:WAF “offload” features:Cookies Brute ForceDDOSWeb ScrapingSSL, Caching, CompressionIntegration & Test:Policy TuningPen testsPerformance TestsInstallation & AcceptanceFinal Policy TuningPen Tests
  • Rely on key partnerships give you full vulnerability checking and website protection: Decouple security from the SDLCAddress new vulnerabilities immediatelyEnsure PCI compliance
  • Faced with an increasing variety of Internet threats, conventional firewalls are failing. The F5 data center firewall solution helps you protect corporate resources by implementing strong security services at the edge of your network.Get advanced built-in networking firewall capabilitiesConsolidation of multiple security functionsInbound protection: datacentre firewallHigh scale for the most common protocols
  • Faced with an increasing variety of Internet threats, conventional firewalls are failing. The F5 data center firewall solution helps you protect corporate resources by implementing strong security services at the edge of your network.Conventional firewalls simply don’t have the flexibility and speed to hold up under DDoS attacks. The F5 data center firewall solution allows more connections per second and scales faster and higher than any other firewall—so users get speedy site response even when you’re under attack.Protect your organization with all-in-one security. With the industry’s only complete data center firewall, integrated application delivery, and access control solution, F5 provides easy application security management, vulnerability assessment, and device consolidation.Attain protection from full spectrum of DDoS attacks:DDoS protection at all layersWithstands the largest attacksVisibility and detection of SSL encrypted attacks
  • To a hacker, encryption is the cloak of invisibility. It’s a direct tunnel into the application. Into the data. Decrypting SSL enables you to achieve full SSL visibility and protection: Gain visibility and detection of SSL encrypted attacksAchieve high-scale/high-performance SSL proxyOffload SSL—reduce load on application servers
  • F5’s powerful solutions across the Application Delivery Network come from a completely integrated platform, a platform that’s designed from the ground up for complete ADN management solely to make application Fast, Available, and Secure. Application Fluency and Scale: The F5 Integrated Services Platform starts with hardware and software designed to deliver applications. The hardware and software components work together to provide complete control and are designed to scale up in the data center and out to off-premise locations like the cloud. Unified Services: There are many point products on the market that try to solve one singular problem at one location in the data center. But point products aren’t capable of addressing all application delivery services at once, nor do they have the deep visibility across the entire infrastructure to understand how to manage application delivery from the app down to the end-user. Unmatched Programmability: Although F5’s Intelligent Services Platform already knows how to manage application delivery in thousands of scenarios, every customer environment is always unique. F5 devices are fully programmable and configurable to match the unique challenges that each customer requires. This allows customers to manage F5 devices in their own environment.
  • The F5 ScaleN architecture provides the ability to scale up or scale out on demand, creating an elastic ADC processing platform that can grow as your business needs change. The ScaleN approach delivers a superior way to scale application delivery services, resulting in true deployment flexibility and simplified maintenance. ScaleN gives you a higher level of application uptime and helps you meet stringent service level agreements. The flexibility of this new scalability model means organizations can use cloud computing in a variety of ways, including for architectures like virtualized and bridged models, to ensure resiliency and scale across and within environments. An organization with a hardware-only model in the data center can take advantage of ScaleN to failover or scale out using software or virtualized components, in the cloud or remote data centers, as easily as it can employ virtualized instances using vCMP technology in the primary data center. vCMP makes it possible to deploy individual BIG-IP LTM instances that enable fault-isolation, version independency, and on- demand, hardware-layer scalability.
  • ScaleN is an F5 technology that uses horizontal clustering, virtualization, and on-demand scaling capabilities to enable more efficient, elastic, and multi-tenant solutions for data centers, clouds, and hybrid deployments. ScaleN breaks away from traditional infrastructure limitations and offers multiple scalability and consolidation models to help organizations meet their specific business needs.Modern data center models are based on flexible and scalable on-demand services to adapt to shifting business requirements and performance and application needs. This on-demand approach eliminates costly over-provisioning methods used in the past to ensure enough capacity was on hand to meet sudden spikes in demand. It also improves resource utilization to deliver a better return on investment.F5 ScaleN uses three deployment models to give you ultimate flexibility and scalability to adapt to these shifting demands.On-demand scalingIncrease resource capacity with on-demand scaling, available with the F5 VIPRION hardware platform. You can simply add more power to your existing infrastructure instead of adding more devices.VIPRION hardware provides true linear scalability through modular blades. As blades are added for more power, they are automatically available to the system, with no configuration or changes needed. Horizontal clusteringIncrease capacity by adding BIG-IP resources through an all-active approach. Horizontal clustering enables you to scale beyond the traditional device pair to eliminate the need for idle and costly standby resources. You get the flexibility to leverage any combination of physical or virtual BIG-IP platforms for data centers, clouds, and hybrid deployments.Application Service Clustering provides application- and service-level control and failover to deliver industry-leading availability. Workloads can be moved across a cluster of BIG-IP instances without interrupting other services and can be scaled to meet the business demand.Device Service Clustering gives you the ability to group an array of BIG-IP devices to scale your infrastructure to up to 32 active nodes. This ensures a consistent device configuration that simplifies operations.VirtualizationIsolate and protect tenants by virtualizing your Application Delivery Controller (ADC) services with a multi-tenant architecture that supports a variety of BIG-IP versions and product modules on a single device.This multi-tenant architecture enables consolidation through both administrative and network isolation to support hundreds of tenants. Isolation ensures security and protects from oversubscription and inadvertent changes.For more information read: F5’s White Paper: ScaleN: Elastic Infrastructurehttps://devcentral.f5.com/blogs/news/scalenhttps://devcentral.f5.com/blogs/news/scalen-virtualizationhttps://devcentral.f5.com/blogs/news/scalen-on-demand-scalinghttps://devcentral.f5.com/blogs/news/scalen-horizontal-clustering
  • What makes TMOS so unique is that by leveraging hardware transparently when possible, coupled with a custom high-performance application deliver operating system, it is able to achieve truly unparalleled performance, while still offering all the benefits of a real full-proxy design. F5’s Intelligent Services Platform, built on TMOS, can be deployed with hardware, software, or a combination of both deployment options.
  • For hardware, F5’s Intelligent Services Platform can be deployed across an array of hardware choices designed to address different application needs, deployment scenarios, and resource requirements in the data center.Hardware designed specifically for application deliveryIndustry’s best performance—up to 20M L7 RPS and 640 Gbps throughputUltra reliable, long life componentsCompliance options—FIPS, Common Criteria, NEBSAlways-on managementHardware SSL offload and compression
  • F5’s Intelligent Services Platform can also be deployed with software-only options – called BIG-IP VE – where BIG-IP TMOS, and any/all application modules, run in a dedicated virtual machine. BIG-IP VE can run in various licensing models across all major hypervisor technologies including public cloud providers such as Amazon AWS.
  • iRule: An iRule is a script that you write if you want to make use of some of the extended capabilities of the BIG-IP that are unavailable via the CLI or GUI.We provide the tools you need to make the extension. 79% of F5 customers deploy iRules on production BIG-IP devices (according to iHealth data).iApps: An iApp is a user-customizable framework for deploying applications. It consists of three components: Templates, Application Services, and Analytics -- fully vetted extensions that have been integrated into the product. 84% faster deployment time and 90% accuracy of configuration.iControl:iControl is the first open API that enables applications to work in concert with the underlying network based on true software integration, creating a management interface via a programmatic API across the entire application delivery network. iControl contains over 5,500 API calls for BIG-IP control, integration, and management.
  • iRules have complete visibility and the ability to manipulate all application traffic that flows through F5’s Intelligent Services Platform. And as a full proxy, iRules can be applied to both users and applications independently and at a different parts of the application delivery session. In a nutshell, iRules provide complete flexibility _and_ control for all users, devices, applications, networks, and any other part of the application delivery network.
  • F5 iApps is a powerful set of features in the BIG-IP system that can help you deploy 10x-100x faster with 95 percent fewer configuration mistakes. iApps provides a new way to architect application delivery in the data center by unifying, simplifying, and controlling the entire Application Delivery Network with a contextual view – and advanced statistics about the application services supporting your business. An application-centric view means deploying application services that reside in the network—such as authentication, data protection, traffic management, and acceleration—and aligning them to the applications for which they’re being used. Unifying these services, regardless of function, and associating them with Microsoft Exchange or SharePoint, Oracle, or custom applications, enables you to provision network services as rapidly and with the same portability as the applications themselves.By managing application services rather than the individual networking components and configurations, you can dramatically speed up deployment, lower OpEx, and streamline IT operations. You can provision application services in minutes rather than weeks, significantly improving time-to-market and creating a highly efficient and predictable process for successful application delivery.
  • iControl is a Web services-enabled open API providing granular control over the configuration and management of F5’s application delivery platform, BIG-IP®. iControlcan be used by virtually any platform capable of integrating via SOAP (Simple Object Access Protocol). It can be used to build custom management and monitoring applications, to integrate with business process management (BPM) and other workflow applications, and can be integrated directly into applications to provide better control over the delivery of the application. It also integrates with virtual computing platform management tools like VMware vCenter and Microsoft System Center Virtual Machine Manager (SCVMM) to help orchestrate the automated provisioning and de-provisioning of applications that can be used to build private and public cloud computing environments.Using iControl you can control the way your application is delivered based on factors you define. You can modify the F5 BIG-IP device’s configuration in myriad ways, including: Adding servers dynamically to an application pool Stopping requests from going to an application server Changing the way requests are routed to servers Influencing the choice of servers based on current application or server load
  • F5 Enterprise Manager significantly reduces the cost and complexity of managing multiple F5 devices. You gain a single-pane view of your entire application delivery infrastructure and the tools you need to automate common tasks, ensure optimized application performance, and improve budgeting and forecasting to meet changing business needs. Enterprise Manager is available as a physical or virtual edition.Centralized Management reduces Operating Expenses of managing F5 deployments by automating common management tasks and simplifying software updates.Centralized Analytics and Performance Monitoring Modules ensures application performance optimization and aids in troubleshooting application delivery problems
  • F5’s Intelligent Services Platform is built on top of extremely strong partnerships with application, infrastructure, and technology partners across the industry.
  • F5 provides customers with World Class Services. Deep Technology Expertise: Our services professionals hold numerous certifications in F5 products and have extensive experience in network, storage, servers, and security to help deploy and support solutions that scale on demand and deliver fast, secure, and available applications for customers.Service Excellence: With a reputation for going above and beyond the call of duty, F5 Services professionals consistently achieve high customer satisfaction ratings.Customer Focus: Our Services team has deep expertise with leading technologies, including virtualization, web acceleration, mobile applications, and storage to help customers reach their business goals.Global Reach:Our teams have delivered engagements in over 60 countries; ensuring we always are close to the customer’s business.With F5 Global Services, customers can be assured of faster time to market; maximum ROI, increased project success and quicker problem resolution
  • F5’s powerful solutions across the Application Delivery Network come from a completely integrated platform, a platform that’s designed from the ground up for complete ADN management solely to make application Fast, Available, and Secure. Application Fluency and Scale: The F5 Integrated Services Platform starts with hardware and software designed to deliver applications. The hardware and software components work together to provide complete control and are designed to scale up in the data center and out to off-premise locations like the cloud. Unified Services: There are many point products on the market that try to solve one singular problem at one location in the data center. But point products aren’t capable of addressing all application delivery services at once, nor do they have the deep visibility across the entire infrastructure to understand how to manage application delivery from the app down to the end-user. Unmatched Programmability: Although F5’s Intelligent Services Platform already knows how to manage application delivery in thousands of scenarios, every customer environment is always unique. F5 devices are fully programmable and configurable to match the unique challenges that each customer requires. This allows customers to manage F5 devices in their own environment.
  • Soluções F5 Networks - FORENSE Tecnologia

    1. 1. F5’S INTELLIGENT SERVICESPLATFORM FOR ENTERPRISESales Presentationv1-11.3Deivid Toledodtoledo@forense.net.br
    2. 2. Agenda1. F5’S INTELLIGENT SERVICES PLATFORM2. ENTERPRISE VALUE• FAST• SECURE• AVAILABLE3. EXTENSIBILITY
    3. 3. F5 Overview-50,000100,000150,000200,000250,000300,000350,000400,000$ThousandsPublicly traded on NASDAQ3,000+ employeesIPO in 1999F5 Networks is the leadingprovider of application and datadelivery networkingOur products sit at strategicpoints of control in anyinfrastructureFiscal Year 2012 RevenueUS$1.38B1,380,000,000
    4. 4. 8 of the Fortune 10 companies • 44 of the Fortune 50 companies • 18 of the top 20 U.S. commercial banks • 3 of the topF5 MAKES THECONNECTED WORLDRUN BETTER
    5. 5. 185 billionmobile appdownloadsby 201450 billion connecteddevices by 2020Cloud Computing is in the Top 3concern for CIO priority in 2012More deliverymechanisms71% of all work will be mobileor web-based by 2020Morechallengesimpacting ITinfrastructureMore users andmore choices
    6. 6. Traditional Application Delivery ChallengesFirewallADCClientsApp servers StorageApp servers Storage
    7. 7. Traditional Application Delivery ChallengesADCApp servers StorageSaaSCloudFirewallClientsMore Endpoints More Delivery Models More AppsApp servers Storage
    8. 8. Solution: An Intelligent Services PlatformVirtualPhysicalCloudStorageAn Intelligent Services Platformconnects any user, anywhere, from anydevice to the best applicationresources, independent ofinfrastructure.Anywhere, any service, any device Intelligent Dynamic, agile, adaptiveClients
    9. 9. F5 Delivers an Intelligent Services PlatformAn integrated device with STRATEGIC AWARENESS• Understands and adapts applicationresources based on user context andexpected application behavior• Delivers full application state visibility andcomplete session inspection• Provides total control of all user andapplication traffic in and out of the datacenterAPPLICATION AWARENESS• Provides real-time traffic managementdecisions based on applicationperformance• Assists with capacity planning andperformance tuning• Delivers true application deliveryoptimization without the need to rewriteapplicationsRESOURCES AWARENESS• Proxies and inspects 100% of inbounduser traffic• Determines user environment such asdevice type and location• Applies application delivery policies basedon real-time business needsUSER AWARENESS
    10. 10. Full Intelligence Requires a Full Proxy• App “point of delivery & definition”• App Intelligence - layer 3- 7 visibility• Distinct client / server control• Unified services / context• Interoperability and gateway functionsIntelligent Full Proxy BenefitsNetworkSessionApplicationPhysicalOSI StackIT = Complete ControlBusiness = Reduced Delivery CostsNetworkSessionApplicationPhysicalOSI Stack
    11. 11. iRules iControl iAppsHardware SoftwareTMOSSecureAvailableFastF5: An Intelligent Services PlatformF5 makes the connected world run better• Application Delivery Controller• Mobile optimization solution• Application Delivery Firewall• Mobile User and ApplicationAccess Management• WAN Opt and WAN acceleration• DNS Delivery Services• Local and Global Load BalancerDevCentralUser CommunityProgrammable/ExtensibleEnterpriseFoundationCustomizableTraffic ManagementIntelligentIntegratedContext awareScaleF5 solutions available today:Intelligent Ecosystem
    12. 12. Delivers applications to high-performance mobile andremote users while providing dynamic, flexible andpowerful security.Efficiently delivers highly reliable application services whilemaintaining maximum availability regardless of location orstate.Improves performance, increases employeeproductivity, boosts business operations and drivese-commerce revenue.Benefits of the Intelligent Services Platform for EnterpriseFastAvailableSecureEnterpriseiRules iControl iAppsHardware SoftwareTMOSSecureAvailableFastDevCentral
    13. 13. Fast Improves performance, increases employee productivity,boosts business operations and drives e-commerce revenue.Every 100ms delayAs of October 2012, there wereover 188 million active websites,a growth of 180% over the last5 years.When we moved ourMicrosoft applicationservers behind theBIG-IP LTM devices,we immediately noticeda dramatic performanceimprovement—thedifference was likenight and day.Kevin Rice,Global Network Architect,A.T. Kearney20122007Costs Amazon1% insales.20122007DNS hasgrownover 100%in the last5 years.180%74% are willing to wait5 seconds or lessfor a single web page to loadbefore leaving the site.
    14. 14. Efficiently delivers highly reliable application services whilemaintaining maximum availability regardless of location or state.AvailableBIG-IP GTM has had animmediate and profoundeffect on our reliability.If a server ever goesdown, it reduces ourdowntime from 8-10minutes to a coupleof milliseconds.Don Wood,Director ofTechnology, DNSstuff.com75%of all U.S. businesseshave experiencedinterruptions due to:powerhardwaretelecommunicationssoftware problemsA new set of customers.There is a large, untapped customer base in Asia thatconnects with IPv6-only devices and can onlycommunicate with IPv6 hosts.IPv6IPv6“Cloud-based disaster recovery hasthe potential to give companies lowercosts yet faster recovery, with easiertesting and more flexible contracts.”- Rachel Dines, Forrester
    15. 15. Secure Delivers applications to high-performance mobile and remote users whileproviding dynamic, flexible and powerful security.BIG-IP APM gives usan essential additionallayer of security.It also allows us toprovide secure remoteaccess to each of ourcustomers’ corporateIT environments fromtheir own networksand devices.Jeffrey Dahn, CIO,Lokahi Solutionsof surveyed Internet, technology andsocial experts predict most work willbe done via web-based or mobileapplications by 2020.4XAnonymous proxies… have steadilyincreased, more than quadrupling in numberas compared to three years ago.An everyday laptop on anaverage connection can takedown an enterprise webserver using SSL/TLS.
    16. 16. The Power of an Integrated PlatformIntelligent Services PlatformiRules iControl iAppsHardware SoftwareTMOSSecureAvailableFastDevCentralUnmatched Programmability: Built in customizationwith an extensible and programmable architecture(iRules, iApps & iControl)Unified Services: Delivers dynamic application deliveryservices from the data center to the deviceApplication Fluency and Scale: Adapts to shiftingrequirements of performance and application and userneeds with Platforms and Traffic Management OS
    17. 17. EnterpriseiRules iControl iAppsHardware SoftwareTMOSDevCentralSecureAvailableFastApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxyAvailableSecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideSecureiRulesiControliAppsProgrammabilityHardwareSoftwareTraffic ManagementFast
    18. 18. FASTImproves performance, increases employeeproductivity, boosts business operations and drivese-commerce revenue.
    19. 19. iRules iControl iAppsHardware SoftwareTMOSDevCentralSecureAvailableFastFastApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxySecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideiRulesiControliAppsHardwareSoftwareFastAvailableSecureProgrammabilityTraffic Management
    20. 20. Application Delivery ChallengesApplication Delivery OptimizationBusiness Owner“Your users expect their business experience tobe as good as their consumer experience.”How do you deliver a consistently fast experienceregardless of the countless variables?Without spending upward of$100,000 per application just to“tune” delivery.Right contentRight deviceRight user experience/ $100,000
    21. 21. Approach:Application Delivery OptimizationServer + Network + Front End Optimization =Dynamic, highly interactive web applicationsat the speed of business.Server capacity Bandwidth utilization App response timeImproved
    22. 22. Application Delivery OptimizationWebperformanceFaster user experience = moretime spent on page.Mobile contentdeliveryDeliver the right content to theright device for the right userexperience.Enterpriseapplication performanceSpeed up business tools likeMicrosoft Exchange, OracleE-Business, and customenterprise applications.
    23. 23. HOMEBefore f5Web applicationWeb applicationwith f5• Reduce back-endservers• Reduce applicationload from servers andnetwork• Improve userexperienceWEB PERFORMANCEApplication Delivery OptimizationHTMLCSSJPGHTMLCSSJPG
    24. 24. HOMEBefore f5Web applicationWeb applicationwith f5HTMLCSSJPG HTML JPGCSS• Reduce back-endservers• Reduce applicationload from servers andnetwork• Improve userexperienceWEB PERFORMANCEApplication Delivery Optimization
    25. 25. HOME• Optimize deliveryof any applicationcontent toany device• Improve userexperience throughdynamic imageoptimization• Reduce amountof data overthe networkCustom AppMOBILE CONTENT DELIVERYApplication Delivery Optimization
    26. 26. HOME• Help improveemployee productivity• Consolidate back-endservices• Improve performancewithout recoding appsCustom appENTERPRISE APPLICATION PERFORMANCEApplication Delivery Optimization
    27. 27. ProductsSolution SummaryApplication Delivery OptimizationOptimize web performance• Reduce time to load and improve userexperienceMobile device awareness• Deliver customized device-aware contentoptimizationBroad enterprise application support• Achieve application delivery optimization andenhanced productivity without the need torewrite applications• BIG-IP Local Traffic Manager• BIG-IP Web AcceleratorServices• Proactive Assessment• Implementation Services• Design Architecture forMicrosoft Exchange
    28. 28. iRules iControl iAppsHardware SoftwareTMOSDevCentralSecureAvailableFastFastApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxySecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideiRulesiControliAppsHardwareSoftwareFastAvailableSecureProgrammabilityTraffic Management
    29. 29. Data Center Optimization ChallengesData Center OptimizationNetwork andApplication Owners“IT departments have the 1000’s of apps spread across multipledata centers and the cloud, but IT lacks visibility and control ofthese apps and the demands placed on a distributed infrastructure.”Failing to address this problemproperly will:How do you optimize your datacenter when you are contendingwith the growth of:Web servicesVideoApp bloatBandwidthServer capacityDNS query growthIncrease infrastructure costsDecrease productivity and revenue
    30. 30. Approach:Data Center OptimizationWith F5 as the strategic point of control you’ll see:With F5 you’ll see an immediate improvement in applicationperformance without making a costly investment in yourinfrastructure.Server offload User management Reduced traffic networkImproved
    31. 31. DNSoptimizationApplication andserver offloadingMulti-DC andcloud optimizationDecrease the number ofphysical servers andincrease VM density.Optimized WANconnectivity betweenmultiple DC and cloudlocations.Speed up your DNSinfrastructure for the cloudand data center.Data Center Optimization
    32. 32. HOMEActiveActiveActiveDNSHigh-speedDNS servicesDNSDNS• Manageable andpredictable datacenter utilization• Easy integration intoexisting infrastructurefor high availability• Support for 1 millionqueries/secondDNS OPTIMIZATIONData Center Optimization
    33. 33. HOMEVDI VDI VDIVM VM VMHypervisorSharePointCloud• Decrease serverrequirements• Increase VM density • Reduce costs bydeploying fewerservicesAPPLICATION AND SERVER OFFLOADINGData Center OptimizationVirtualized appsSSL Caching CompressionOffloadingNetwork Services TCP Connection
    34. 34. HOMEData center 1• Reduce data betweendata centers, optimizebandwidth• Improve datareplication• Improve RTOORData center 2CloudOptimizedMULTI-DC AND CLOUD OPTIMIZATIONData Center Optimization
    35. 35. Solution SummaryData Center OptimizationOptimize DNS infrastructure for speed• Enhanced DNS delivery by offloading DNSservices to the edgeIncrease server efficiency• Decrease physical servers and increaseVM density, reducing operating costsScale across multiple data centerand the cloud• Optimized WAN connectivity between localand cloud resourcesProducts• BIG-IP Global TrafficManager• BIG-IP Local Traffic Manager• BIG-IP WAN OptimizationManager• BIG-IP Web AcceleratorServices• DNS Services• Proactive Assessment• Implementation Services
    36. 36. AVAILABLEEfficiently delivers highly reliable application serviceswhile maintaining maximum availability regardless oflocation or state.
    37. 37. iRules iControl iAppsHardware SoftwareTMOSDevCentralSecureFastAvailableAvailableApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxySecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideiRulesiControliAppsHardwareSoftwareFastAvailableSecureProgrammabilityTraffic Management
    38. 38. Cloud Delivery ChallengesCloud Application DeliveryIT Decision MakerOver 51% of CIOs want convergedinfrastructure.Businesses are looking to scale virtualized serverdeployments and manage, optimize and drivebusiness intelligence in data.9 out of 10 IT organizations admit toincreased costs of maintenance ofexisting networks.Converged infrastructureData growthVirtualized data centers
    39. 39. Approach:Cloud Application DeliveryCloud Infrastructure + Software Networking +Virtualized ADN Services =Programmability and extensibility of Application DeliveryNetworking services for physical and software definednetworks.SaaSScalable infrastructure Application mobility Software-enabled servicesDelivers
    40. 40. Scalable Infrastructurefor Private CloudCloudBurstingHybrid Cloud/CloudBalancingScale out to the cloud asdemand for applicationresources spike.Easily integrate with all leadingcloud infrastructure platforms.Route user requests toapplications or workloads thatreside in multiple clouds.Cloud Application Delivery
    41. 41. HOME• Employ automatic provisioning• Scale on demand• Integrate with managementplatformsSCALABLE INFRASTRUCTURE FOR A PRIVATE CLOUDCloud Application DeliveryMonitoring &managementVirtualizationManagementPlatformiControlDemandDetectionAutomationF5 ProvisionVM ProvisionAppserverAppserverApp serversvirtualization
    42. 42. HOME• Extend data center to the cloud• Scale applications beyond the datacenter• Secure and accelerate connectionsto the cloud• Pay only when you need itCLOUD BURSTINGCloud Application DeliveryEnterprisedata centerPublic cloudPublic cloud
    43. 43. HOMEPublic cloud,North AmericaEnterprise,private cloud,EMEAPublic cloud,Asia• Sustain cloudproximity• Deliver granularuser control andmanagement• Use cloud effectivelyfor application deliveryHYBRID CLOUD/CLOUD BALANCINGCloud Application Delivery
    44. 44. Solution SummaryCloud Application DeliveryDynamically provision applicationdelivery resources• Integrate with all leading cloud infrastructureand management platformsScale out to the cloud based on demand• Seamlessly burst to both public and privatecloudsDistribute users between clouds• Direct user traffic to the most appropriatecloud services based on location andperformanceProducts• BIG-IP Global TrafficManager• BIG-IP Local Traffic Manager• BIG-IP WAN OptimizationManagerServices• Cloud OrchestrationServices
    45. 45. AvailableApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxySecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideiRulesiControliAppsHardwareSoftwareFastAvailableSecureiRules iControl iAppsHardware SoftwareTMOSDevCentralSecureFastAvailableProgrammabilityTraffic Management
    46. 46. Virtualization ChallengesVirtualization enablementIT Decision Maker“The CIO expects you to reduce costs andimprove responsiveness to the business.”How do you respond to newinfrastructure pressures in a traditionaldata center?Without compromising applicationdelivery and performance.Manual and expensiveoperationsData growth andapplication scale
    47. 47. Approach:Virtualization EnablementVirtualization + Traditional Network + SDN =Consistency, programmability and extensibility with F5 asIntelligent Services Platform supports virtualization solutionsalong with traditional networks and dynamic SDNenvironments.Choice OPEX / CAPEX Multi-service platformImproved
    48. 48. Simplified VDI Integrated SDN servicesLeverage the power of integrated SDN servicessuch as VMware’s VXLAN and Microsoft’sNVGRE.Overcome the unique network challenges whendeploying VDI.Virtualization EnablementCONTROL PLANEDATA PLANE
    49. 49. HOME• Optimize theexperience for yourusers• Simplify infrastructureand reduce costs• Unify access controland securitySIMPLIFIED VDIVirtualization EnablementAAAServerRDPViewXenDesktopVDI VDI VDI
    50. 50. HOMENew NetworkSDN ControllerINTEGRATED SDN SERVICESVirtualization Enablement• Bring applicationawareness to an SDNinfrastructure• Flexibility to add andextend new SDNservices• Integrate with existingSDN solutions fromVMware and Microsoft
    51. 51. Solution SummaryVirtualization EnablementProducts• BIG-IP Global TrafficManager• BIG-IP Local Traffic Manager• BIG-IP Access PolicyManagerServices• VDI Solution Services• Custom ScriptingImplementation ServicesSimplify VDI deployments• Optimization solutions for Citrix, Microsoftand VMwareIntegrated SDN services• Deploy application and networkvirtualization solutions without friction
    52. 52. AvailableiRules iControl iAppsHardware SoftwareTMOSDevCentralSecureFastAvailableApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxySecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideiRulesiControliAppsHardwareSoftwareFastAvailableSecureProgrammabilityTraffic Management
    53. 53. Load Balancing and Proxy ChallengesAdvanced Load Balancing and ProxyIncompatible and remote networks leave youwith lack of visibility and control.This results in the inability to manageSLAs, and guarantee availability, as well aslimits application management and increasesin both OPEX and CAPEX.HTTP DNS IPv6SPDY SIP$ArchitectThese challenges are compounded withnew and evolving protocols as well asever-increasing and inconsistent traffic.
    54. 54. Approach:Advanced Load Balancing and ProxyAlways on Simple to manage Easy to scaleF5 application delivery solutions provide intelligent loadbalancing and much more to remove single points of failureand virtualize the network and applications.Ensuresapplications are:Availability + Speed + Security =
    55. 55. Advanced Load Balancing and ProxyApplicationperformance andhealth monitoringEnsure optimalapplication performancewith applicationstatistics, healthmonitoring and analytics.Applicationscaling andintegrationSeamlessly translateapplication protocolsbetween user devices anddata center resources.Concurrent IPv4and IPv6servicesAllow traffic to travelfreely between IPv4 andIPv6 networks.Intelligent trafficmanagementOptimize trafficmanagement decisionsbased on contextualmessage data.Applicationlocation andresilienceRoute users to the bestlocation based onapplication availabilityand performance.
    56. 56. HOME• Monitor and analyzeapplication andnetwork health• Achieve real-timeapplication availabilityand fail-over• Application visibilityand scale for capacityand troubleshootingAPPLICATION PERFORMANCE AND HEALTH MONITORINGAdvanced Load Balancing and Proxy
    57. 57. HOMEPublic cloud,AsiaEnterprisedata center,North AmericaEnterprisedata center,EMEA• Route user to mostavailable location• Monitor applicationservices globally• Deploy automaticdisaster fail-over withminimal downtimeHong KongLondonNew YorkAPPLICATION LOCATION AND RESILIENCEAdvanced Load Balancing and Proxy
    58. 58. HOMEBefore f5• Support any device orany network• Dynamically translateand proxy betweenboth• Achieve zero frictionmigrationCONCURRENT IPV4 AND IPV6 SERVICESAdvanced Load Balancing and ProxyIPv6IPv4with f5IPv6IPv4
    59. 59. HOMEBefore f5• Support any device orany network• Dynamically translateand proxy betweenboth• Achieve zero frictionmigrationCONCURRENT IPV4 AND IPV6 SERVICESAdvanced Load Balancing and Proxywith f5IPv6IPv4IPv6IPv4
    60. 60. HOMEwith f5Before f5APPLICATION SCALING AND INTEGRATION• Translate betweenmultiple applicationprotocols• Avoid rewritingapplications• Benefit from supportfor 3,600 applicationprotocols nativelyAdvanced Load Balancing and Proxy…HTTPSSL 1KSPDYSSL 2KHTTPSSL 1KHTTPSSL 2KHTTPSSL 1KHTTPSSL 1KFirewallADC
    61. 61. HOMEBefore f5APPLICATION SCALING AND INTEGRATION• Translate betweenmultiple applicationprotocols• Avoid rewritingapplications• Benefit from supportfor 3,600 applicationprotocols nativelyAdvanced Load Balancing and Proxy…SPDYSSL 1KSPDYSSL 2KHTTPSSL 1KHTTPSSL 2KHTTPSSL 1KSPDYSSL 2Kwith f5
    62. 62. HOMEINTELLIGENT TRAFFIC MANAGEMENTAdvanced Load Balancing and Proxy• Translate betweenmultiple applicationprotocols• Avoid rewritingapplications• Support for 3,600application protocolsnativelySharePoint 2007SharePoint 2010Browser: IE8Browser: Firefox http://sp.f5.comhttp://sp.f5.com/testhttp://newsp.f5.comiRule:If URI = /test> Go to 2010If Browser = Firefox> Go to 2007
    63. 63. • Proactive Assessment• GTM Implementation Services• IPv6 Solution Services• Custom Scripting and iRules• GTM and LTM ImplementationServicesSolution SummaryAdvanced Load Balancing and ProxyEnsure optimal application availability and performance• Direct users to the best location based on real-timeapplication delivery dataManage the incompatibilities and migration of IPv4and IPv6 services• Allow traffic to move freely and coexist betweendifferent network topologiesFuture-proof your business• Support for all major protocols today and tomorrowOptimize performance and intelligently route traffic• Make the best availability decision based on trafficdataProducts• BIG-IP Global Traffic Manager• BIG-IP Local Traffic ManagerServices
    64. 64. SECUREDelivers applications to high-performance mobile andremote users while providing dynamic, flexible andpowerful security.
    65. 65. iRules iControl iAppsHardware SoftwareTMOSDevCentralAvailableFastSecureSecureApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxySecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideiRulesiControliAppsHardwareSoftwareFastAvailableSecureProgrammabilityTraffic Management
    66. 66. Secure Access ChallengesSecuring access to applications from anywhereEnd UserThe number of enterprise customers usingmobile-based applications will rise to more than130 million by 2014.How do you provide access to enterprise applicationsto users no matter where they are or what device theyare working on?Without compromising the securityand the integrity of your data andapplications.Mobile devicesMobile workersMobile applications
    67. 67. Approach:Securing access to applications from anywhereWith F5: device choice + hybrid deployments = secure accessEndpointinspectionMulti-factorauthenticationAcceleratedremote accessF5 security accelerates application access fromany device and location.Web and enterpriseaccess managementThrough:
    68. 68. Enabled safeBYODAccelerated andsecure remoteaccessEnhanced webaccessmanagementStreamlinedExchangeSimplified VDIConsolidated appauthenticationGive employeessecure, fast accessto resourcesregardless of wherethey are.Make it easy andsecure foremployees to usetheir personaldevices.Deliver VDI just likean application whilegiving usersfast, flexible access.Enable simplifiedand secure webapplication accessto employees.Improve migration toExchange 2012while gettingsecure accessacross devicesand locations.Get Kerberos singlesign-on across amultitude ofapplications - nomore multiplepasswords toremember.VIEW XENRDPSecuring Access to Applications From Anywhere
    69. 69. HOMEUser = FinanceApp StoreHRCRMFinanceCorporatemanageddevice?Corporatemanageddevice?• Ensures connecting devices adhereto baseline security posture• Reduces the risk of malwareinfecting the corporate networkENABLE SAFE BYODSecuring access to applications from anywhereAAA Server
    70. 70. HOME8 3 2 8 4 9• Fast and secure connectionsmaximize productivity for globalusers• Seamless integration minimizescost and simplifies end userexperienceACCELERATED AND SECURE REMOTE ACCESSSecuring access to applications from anywherewww.f5.comAAAServer
    71. 71. HOME• Providesauthentication, authorization, endpoint inspection, and more• Types into Layer 4-7 ACLS throughF5’s easy-to-use Visual PolicyEditor.ENHANCED WEB ACCESS MANAGEMENTSecuring access to applications from anywhereCreate PolicyCorporate DomainLatest AV softwareCurrent O/SAdministratorUser = HRHRAAAServer8 3 2 8 4 9
    72. 72. HOME• Secures Active Sync / Mobile, OWAand Outlook Anywhere• Assists in disaster recovery andExchange 2007 to 2010 migrationSTREAMLINE EXCHANGESecuring access to applications from anywhereAAAServerOutlook2010Outlook2007FinanceSalesHRExchangeActiveSyncOutlookWebAccessOutlookAnywhere
    73. 73. HOME• Optimize theexperience for yourusers• Simplify infrastructureand reduce costs• Unify access controland securitySIMPLIFIED VDISecuring access to applications from anywhereAAAServerRDPViewXenDesktopVDI VDI VDI
    74. 74. HOME• Dramatically reduceinfrastructure costs;increase productivity• Provides seamlessaccess to all webresources• Integrated withcommon applicationsCONSOLIDATED APP AUTHENTICATIONSecuring access to applications from anywhereAAAServerCorporateManaged DeviceLatest AV softwareExpenseReport AppFinanceSalesforce.comUser = Finance
    75. 75. Solution SummarySecuring access to applications from anywhereProducts• BIG-IP Global Traffic Manager• BIG-IP Access Policy Manager• BIG-IP Web Accelerator• BIG-IP WAN OptimizationManagerServices• Proactive Assessment• APM Implementation Service• Architecture Design forExchange• APM and LTM ImplementationService• VDI Solution ServicesMobile device support• Support for BYOD initiativesSecure accelerated remote access• Fast and safe remote connectionsBroad application support• Exchange, VDI / RDP, SharePoint, etc.Centralized web access management• Intuitive visual policy editorContext and identity aware• Granular access control
    76. 76. SecureApplication Delivery OptimizationData Center OptimizationCloud Application DeliveryVirtualization EnablementAdvanced Load Balancing and ProxySecuring Access to Applications from AnywhereProtecting Applications Regardless of Where They ResideiRulesiControliAppsHardwareSoftwareFastAvailableSecureiRules iControl iAppsHardware SoftwareTMOSDevCentralAvailableFastSecureProgrammabilityTraffic Management
    77. 77. Secure Application ChallengesProtecting your applications regardless of where they liveBusiness OwnerMinimize vulnerability exposure in all of ourapplications.How do you protect your applications when they areconstantly moving and changing?Without worrying about targeted attacks orthe timeline for closing known vulnerabilitieswith an application.Public cloudPrivate cloudHybrid cloud
    78. 78. ImprovingApproach:Application securitySecure your applications and protect your IP with F5’sApplication Delivery Firewall.Vulnerability exposureSecurity consolidation Protection at scaleF5 provides application layer security and protects yourInternet data center from today’s attacks regardless of wherethey live.
    79. 79. Protect IPAssess andmitigate applicationthreatsMinimizevulnerabilityexposureProtect the datacenterGuard againstDDoSInspect SSLRely on keypartnerships giveyou full vulnerabilitychecking andwebsite protection.Defend againstmalicious activityand web attacks.Attain protectionfrom full spectrum ofDDoS attacks.Proactively secureall web applicationsfrom current andfuture threats.Get advanced built-innetworking firewallcapabilities.Achieve full SSLvisibility andprotection.SSLProtecting your applications regardless of where they live
    80. 80. HOMEWebsiteBOTUser• Prevent scannersfrom screen scraping• Deliver ideal solutionfor e-commerce siteor airlines• Block BOTS whileallowing real usersAUTOMATED BOT AND SCANNER PREVENTIONProtecting your applications regardless of where they live$
    81. 81. HOMECustomer website• Vulnerabilitychecking, detectionand remediation• Complete websiteprotection• Finds a vulnerability• Virtual-patching withone-click on BIG-IP ASMVulnerability scannerBIG-IP Application Security Manager• Verification, assessment, resolution andretesting in one UI• Automatic or manual creation of policies• Discovery and remediation in minutes• Qualys• IBM• WhiteHat• Cenzic• Decouple securityfrom the SDLC• Address newvulnerabilitiesimmediately• Ensure PCIcomplianceASSESS AND MITIGATE APPLICATION THREATSProtecting your applications regardless of where they live
    82. 82. HOME• Consolidation ofmultiple securityfunctions• Inbound protection:data center firewall• High scale for themost commonprotocolsHostingAFM / ADC / ASMHostingAFM / ADC / ASMF5 / Other ADCPerimeter firewall deployment Application delivery firewall deploymentwww wwwPROTECTING THE DATA CENTERProtecting your applications regardless of where they live
    83. 83. HOMEGUARD AGAINST DDoSProtecting your applications regardless of where they live• DDoS protectionat all layers• Withstands thelargest attacks• Visibility and detectionof SSL encryptedattacksApplication AttacksNetwork Attacks Session AttacksOWASP Top 10 (SQLInjection, XSS, CSRF, etc.),Slowloris, SlowPost, HashDos, GETFloodsSYN Flood, Connection Flood, UDP Flood, Push and ACKFloods, Teardrop, ICMP Floods, Ping Floods, and Smurf AttacksBIG-IP ASMPositive and negative policyreinforcement, iRules, fullproxy for HTTP, serverperformance anomalydetectionDNS UDP Floods, DNS QueryFloods, DNS NXDOMAIN Floods, SSLFloods, SSL RenegotiationBIG-IP LTM and GTMHigh scale performance, DNSExpress, SSL termination, iRules, SSLrenegotiation validationBIG-IP AFMSynCheck, default-deny posture, high-capacity connection table, full proxytraffic visibility, rate-limiting, strict TCP forwarding.Packet Velocity Accelerator (PVA) is a purpose-built, customizedhardware that increases scale by an order of magnitude above software-only solutions.F5MitigationTechnologiesApplication (7)Presentation (6)Session (5)Transport (4)Network (3)Data Link (2)Physical (1)Increasing difficulty of attack detectionF5MitigationTechnologiesOSI StackOSI Stack
    84. 84. Solution Summary:Protecting your applications regardless of where they liveProducts• BIG-IP Application SecurityManager• BIG-IP Local Traffic Manager• BIG-IP Global Traffic Manager• BIG-IP Access Policy ManagerServices• ASM Vulnerability MitigationAssessment• ASM Implementation Service• Advanced Firewall Manager—Installation and MigrationServices• LTM Implementation ServicesStrong security for your critical applications• Get leading integration with vulnerabilityscannersFree development resources to create value• Use ASM to secure applications whilemaintaining SDLC• Secure your business logicThe firewall is focused on the inbound threatsof the data centerPerformance and scaleCompelling ROI through consolidation
    85. 85. Simplify the network while maximizing security,scale and performanceExperience top-quality extensibility and flexibilitySecure access to applications and data from anywherewhile protecting them wherever they resideProvide the best end-to-end security with Full-proxy DC firewall with#1 ADC, secure access and application securityTake advantage of intelligent services platform, part of DNANew approach to security
    86. 86. iRules iControl iAppsHardware SoftwareTMOSSecureAvailableFastDevCentralUnmatched Programmability: Built in customizationwith an extensible and programmable architecture(iRules, iApps & iControl)Unified Services: Delivers dynamic application deliveryservices from the data center to the deviceApplication Fluency and Scale: Adapts to shiftingrequirements of performance and application and userneeds with Platforms and Traffic Management OSThe Power of an Integrated PlatformIntelligent Services Platform
    87. 87. Scale Up and Scale Out: ScaleNFlexible platform expansionHybrid cloudPhysical, enterprisedata centerPublic cloudThe flexibility to scaleup, virtualize andscale out on demand.
    88. 88. ScaleNElastic, Application-Aware, and Multi-Tenant Infrastructure• Eliminate costly over-provisioning methods• Improve resourceutilization• Consolidate withshared infrastructureOn-Demand Scaling Horizontal Clustering VirtualizationIndustrys only all-activescaling platform handlingapplication-level failoverRobust multi-tenant scalingwith runtime isolation forversions and modulesExtend current infrastructurecapacity without additionaldevicesAll-ActiveApp-Level ControlTMOS TMOS TMOS TMOSVirtualization Partitions
    89. 89. F5 virtual editionsProvide flexible deployment options forvirtual environments and the cloudVirtual ADC is best for:• Accelerated deployment• Private and public cloud deployments• Application or tenant-based pods• Lab, test, and QA deployments• Keeping security close to the applicationPhysical + virtual =hybrid ADC infrastructureUltimate flexibility and performanceHybrid ADC is best for:• Completely integrated Application DeliveryNetwork• Tethered deployments• Symmetric ADC services• Federated authenticationF5 physical ADCsHigh-performance with specialized anddedicated hardwarePhysical ADC is best for:• Fastest performance• SSL offload• Workload isolation• Consolidation• Edge and front door services• Integrated security solutionsTMOS: Hardware and SoftwareFlexible expansionEnterpriseCloud ReadyVirtualizationUnique Application Delivery Architecture: TMOS is the implementation of software on hardware, whichincludes physical, virtual and hybrid deployments for complete Application Delivery flexibility.Best-of-BreedHardware
    90. 90. 01,000,0002,000,0003,000,0004,000,0005,000,0006,000,0007,000,0008,000,0009,000,00010,000,000BIG-IP 2000 Series BIG-IP 4000 Series BIG-IP 10200v BIG-IP 11000 Series VIPRION 2400 VIPRION 4480 VIPRION 4800L7RequestsPerSecond(Inf-Inf)BIG-IP 11000/110502.5M L7 RPS1M L4 CPSUp to 40/42GL7/L4 TPUTPurpose Built Hardware for Application DeliveryFlexible expansionBIG-IP 4000s/4200vUp to 850k L7 RPSUp to 300K L4 CPS10G L7/L4 TPUTVIPRION 24004M L7 RPS1.6M L4 CPS72/160G L7/L4TPUTVIPRION 448010M L7 RPS5.6M L4 CPS160/320G L7/L4TPUTVIPRION480020M L7 RPS10M L4 CPS320/640GL7/L4TPUTBIG-IP 10200v2M L7 RPS1M L4 CPS40/80G L7/L4 TPUTBIG-IP 2000s/2200sUp to 425K L7 RPSUp to 150K L4 CPS5G L7/L4 TPUT
    91. 91. Amazon AWSCitrix XenServerHyper-VKVMVMware vSphereUnmatched PerformanceFlexible expansion3GbpsUnmatched flexibility across all major virtualization platforms.PerformancePrivate Public
    92. 92. Extending the Intelligent Services PlatformTMOS programmabilityiRulesIntercept, inspect, transform, direct andmake decisions based on inbound andoutbound application traffic.iAppsDefine and tie all related applicationavailability, security and optimizationservices to the application. Deploy theseservices with optimum, application-specificconfigurations in only a few minutes.Dev Central: A community of 105,000+ developers in 191 countries publishing andengaging in real-time app delivery solutions. You never have to wait for us.iControlRealize new levels of automation andconfiguration management with F5’s webservices–enabled open.84%fasterdeploy timeOver 5,500managementAPI calls90%accuracyof configuration=iRulesapplicationtrafficmanagementcommands79% of F5Customersdeploy iRuleson productionBIG-IP devicescontain ~600
    93. 93. Top Things iRules Can Do for YouTMOS programmabilityTransformapplication dataProtectYour applicationsManageapplication accessand availabilityCreatecustom solutionsViewthe state of yournetwork• Deploy cookie proxy,encryption, rewrite• Match traffic data to avariable list or array• Use URL-basedredirection• Utilize dynamic HTTP toHTTPS rewriting• Allow SSL renegotiation• Provide immediate securitymitigation at the edge untilapplication code can bepatched• Control bot access to yourapplications• Protect against data leaks(screen and cleanoutbound application data,such as CC and SSN #s)• Utilize advancedapplication persistence• Take advantage of high-performance and ratio-based rate limiting• Enable client auth usingHTML forms• Manage users andapplication access duringdowntime andmaintenance windows• Integrate GoogleAuthentication with anyapplication• Create a pie chart showingyour top website referrers• Build entire SMTP and fileservers, right from an iRule• Track and display siteusage statistics in aheatmap• Distribute email based onsource IP• Monitor application codeperformance (Gomez)• Achieve real-time loggingof any traffic state, event,and data• Employ persistence cookielogger• Track referrals
    94. 94. HOMERemoteAccessSSLVPNAPPFirewallF5 iAPP: HOW IT WORKSTMOS programmability• Delivers policy–drivenconfiguration, automationand provisioning• Changes can be quicklymade and reapplied• Portable between F5devices, enabling rapidmigrationApp optimizationservicesSecurityservicesFirewall
    95. 95. HOMEiControlTMOS programmabilityMonitoring &managementVirtualizationManagementPlatformiControlDemandDetectionAutomationF5 ProvisionVM ProvisionAppserverAppserverApp serversvirtualization• Employ automatic provisioning• Scale on demand• Integrate with managementplatforms
    96. 96. Centralized Management of F5 Deviceswith Enterprise ManagerProgrammabilityEnterprise Manager reduces OpEx and complexity by:• Providing single view of your entire application delivery infrastructure• Automating common management and configuration tasks• Optimizing application performanceData center BIG-IP devicesiHealth
    97. 97. Leveraging AlliancesProgrammability
    98. 98. Benefits of F5 Global ServicesProgrammabilityFastertime to marketIncreasedproject successQuickerproblem resolutionMaximumreturn on investmentTechnology expertise | Service excellence | Customer focus | Global coverageProfessional services Knowledge services Support servicesBetter application performance, enhanced security and higher availabilityiHealth
    99. 99. The Power of an Integrated PlatformIntelligent Services PlatformiRules iControl iAppsHardware SoftwareTMOSSecureAvailableFastDevCentralUnmatched Programmability: Built in customizationwith an extensible and programmable architecture(iRules, iApps & iControl)Unified Services: Delivers dynamic application deliveryservices from the data center to the deviceApplication Fluency and Scale: Adapts to shiftingrequirements of performance and application and userneeds with Platforms and Traffic Management OS

    ×