More Related Content Similar to All 50 Ways to Use BIG-IP Similar to All 50 Ways to Use BIG-IP (20) More from F5 Networks (20) All 50 Ways to Use BIG-IP 2. Performance Caching (WA) Geolocation (GTM, LTM) Quality of Service (QoS, Rate shaping) Data deduplication (WOM) WAN Optimization (WOM) Rate limiting (iRules) Long-distance VMotion (LTM) DTLS for PCoIP (LTM) 3. Security Protocol Security (PSM) Port lockdown (LTM) DNSSEC (GTM) E-mail security (MSM) Application access control (APM) IP Blacklisting (ASM) SQLi Prevention (ASM) XSS Attack prevention (ASM) Cookie encryption (LTM) XML Security (ASM) Secure remote access (APM, Firepass) Data leak prevention (ASM, iRules) FTP Security (ASM) 5. Optimization Compression (WA, WOM) TCP Offload (LTM) SSL Offload (LTM) HTTP Optimization (LTM) Centralized certificate management (SSL) Single Sign-On (APM, EGW) 6. Architecture Application switching (iRules) URL rewriting (iRules) Resource obfuscation (iRules) URL shortener (iRules) Application virtualization (LTM) IPv6 Gateway PKI CAC Integration (LTM, SSL) Honeypot redirection (ASM) Cookie gateway/proxy (LTM, iRules) Custom error pages (iRules) XML Routing (iRules) 7. Availability Load balancing (LTM) Failover (LTM) Global server load balancing (GTM) Auto-scaling (LTM, iControl) SIP Load balancing (LTM) LDAP proxy (iRules) Link Load balancing (LC) DDoS protection (LTM) Sticky sessions (LTM) 8. Load balancers are dead… PSSST! Remember this secret phrase for an extra chance to win a cool prize at Interop Las Vegas: LONG LIVE APPLICATION DELIVERY