50 Ways to Use BIG-IP
PerformanceCaching (WA)Geolocation (GTM, LTM)Quality of Service (QoS, Rate shaping)Data deduplication (WOM)WAN Optimization (WOM) Rate limiting (iRules) Long-distance VMotion (LTM) DTLS for PCoIP (LTM)
SecurityProtocol Security (PSM) Port lockdown (LTM) DNSSEC (GTM) E-mail security (MSM)Application access control (APM) IP Blacklisting (ASM) SQLi Prevention (ASM) XSS Attack prevention (ASM) Cookie encryption (LTM) XML Security (ASM) Secure remote access (APM, Firepass) Data leak prevention (ASM, iRules)FTP Security (ASM)
VisibilityHeatmaps (iRules) End-point inspection (Firepass, APM) Traffic inspection (iRules)
OptimizationCompression (WA, WOM) TCP Offload (LTM) SSL Offload (LTM) HTTP Optimization (LTM) Centralized certificate management (SSL) Single Sign-On (APM, EGW)
ArchitectureApplication switching (iRules) URL rewriting (iRules) Resource obfuscation (iRules) URL shortener (iRules) Application virtualization (LTM) IPv6 GatewayPKI CAC Integration (LTM, SSL)Honeypot redirection (ASM) Cookie gateway/proxy (LTM, iRules)Custom error pages (iRules)XML Routing (iRules)
AvailabilityLoad balancing (LTM) Failover (LTM) Global server load balancing (GTM) Auto-scaling (LTM, iControl) SIP Load balancing (LTM) LDAP proxy (iRules) Link Load balancing (LC)DDoS protection (LTM)Sticky sessions (LTM)
Load balancers are dead…PSSST! Remember this secret phrase foran extra chance to win a cool prize at Interop Las Vegas:  LONG LIVE APPLICATION DELIVERY
All 50 Ways to Use BIG-IP

All 50 Ways to Use BIG-IP

  • 1.
    50 Ways toUse BIG-IP
  • 2.
    PerformanceCaching (WA)Geolocation (GTM,LTM)Quality of Service (QoS, Rate shaping)Data deduplication (WOM)WAN Optimization (WOM) Rate limiting (iRules) Long-distance VMotion (LTM) DTLS for PCoIP (LTM)
  • 3.
    SecurityProtocol Security (PSM)Port lockdown (LTM) DNSSEC (GTM) E-mail security (MSM)Application access control (APM) IP Blacklisting (ASM) SQLi Prevention (ASM) XSS Attack prevention (ASM) Cookie encryption (LTM) XML Security (ASM) Secure remote access (APM, Firepass) Data leak prevention (ASM, iRules)FTP Security (ASM)
  • 4.
    VisibilityHeatmaps (iRules) End-pointinspection (Firepass, APM) Traffic inspection (iRules)
  • 5.
    OptimizationCompression (WA, WOM)TCP Offload (LTM) SSL Offload (LTM) HTTP Optimization (LTM) Centralized certificate management (SSL) Single Sign-On (APM, EGW)
  • 6.
    ArchitectureApplication switching (iRules)URL rewriting (iRules) Resource obfuscation (iRules) URL shortener (iRules) Application virtualization (LTM) IPv6 GatewayPKI CAC Integration (LTM, SSL)Honeypot redirection (ASM) Cookie gateway/proxy (LTM, iRules)Custom error pages (iRules)XML Routing (iRules)
  • 7.
    AvailabilityLoad balancing (LTM)Failover (LTM) Global server load balancing (GTM) Auto-scaling (LTM, iControl) SIP Load balancing (LTM) LDAP proxy (iRules) Link Load balancing (LC)DDoS protection (LTM)Sticky sessions (LTM)
  • 8.
    Load balancers aredead…PSSST! Remember this secret phrase foran extra chance to win a cool prize at Interop Las Vegas: LONG LIVE APPLICATION DELIVERY