SlideShare a Scribd company logo
BIG-IP POLICY ENFORCEMENT MANAGER
OVERVIEW




     February 2013
F5’s INTELLIGENT SERVICES FRAMEWORK
        F5 makes the connected world run better




F5 Solutions Available Today:

   • Policy Enforcement                            User Community
                                                  Intelligent Ecosystem                 DevCentral
   • Mobile Optimization Solution
                                           Programmable/Extensible
   • Diameter Signaling & Interworking                                    iRules         iControl         iApps
                                                         Customizable
   • DNS Delivery Services                                 Ecosystem

   • Advanced Firewall                             Service Provider                     Optimize
                                                            Intelligent
   • Carrier-Grade NAT                                     Integrated
                                                                                         Secure

   • Application Delivery Controller                    Context aware
                                                                                        Monetize

   • Local and Global Load Balancer
                                                        Foundation                        TMOS
   • Mobile User and Application
                                                                 Scale
     Access Management                                                       Hardware                Software
MOBILE INTERNET 3.0




         SMS       Other

                                   Voice               SMS

                                                                Other
      Voice

              1   Business Model
                                    •   Games           •   Location-Based
                                    •   Music               Services
                  Transformation    •   Advertising     •   Banking,
                                    •   Gambling            Commerce,
                                    •   Broadcast TV    •   Healthcare
                                    •   Payments
TODAY’S MOBILE NETWORKS ARE STATIC


                                                             Video optimization                  WAP Gateway                    Transparent caching
  DNS     PCRF     AAA      OCS   CSCF


 Radius, Diameter, DNS, SIP

 Control Plane Services


                                                                                                                            Value-Added Services (VAS)




                                     RTR                            DPI             FW             CGN             RTR

                          GGSN
                          PGW


                                                                                                                                       Internet

                                                                             Challenges
                                    • Complex architecture…hard to scale
                                    • Results in high CapEx and OpEx
Subscriber                          • Difficult to add new services (requires changes to multiple elements, VLAN management…)
SERVICES CONSOLIDATION AND OPTIMIZATION
           Network Optimization


                                                                                                               Video         WAP              Transparent
         DNS     PCRF    AAA       OCS    CSCF                                                              optimization    Gateway             caching

       Radius, Diameter, DNS, SIP




Control Plane Services                                                                                                                 Value Added Services (VAS)


                                                                             One Platform




                              Policy             Gi Firewall     CGNAT          WAP 2.0     URL Filtering        DDoS         DNS
                           Enforcement                                          Offload                        Mitigation   Services                   Internet



                               •   Built for new application       •     Application fluency and
Subscriber
                                   centric network                       extensibility
                               •   Full Proxy – visibility and
                                   control
F5’s NEW BIG-IP POLICY ENFORCEMENT MANAGER
Intelligent Services Framework




 Optimize

   Service providers need a scalable, reliable control plane,
   data plane, and application plane to satisfy customers who
   demand applications and mobile devices that strain the
   signaling network.
                                                                                          Intelligent Traffic Management
 Secure
                                                                                     FW                  PEM                CGNAT
   Security threats are rising, but F5 helps protect entire
   infrastructure and scales to perform under demanding
   conditions.                                                                                          Optimize

                                                                                                        Secure
 Monetize
                                                                                                        Monetize
   Operators struggling with an explosion of data traffic and    Service Provider
   OTT, F5 solutions enable service providers to intelligently
                                                                                                        HW / SW
   manage data traffic, conserve network resources, and
   quickly deliver more profitable services.
                                                                                    High Availability              Highly Scalable
BIG-IP POLICY ENFORCEMENT MANAGER
 Dynamically manages traffic and subscribers in real time to optimize QoE and minimize congestion in the network

                                                                                                                        Value Added Services (VAS)

          Centralized Policy Control                                                              Video        WAP             Transparent
                                                                                               optimization   Gateway            caching

   PCRF       AAA      OCS      CSCF


Radius, Diameter, SIP, Gx


                                                      •   Analytics
                                                      •   Charging
                                   •   Provisioning
                                   •   Quota
                                       Management
                                                                        BIG-IP PEM

                             GGSN
                             PGW


                                                                                                                               Internet

                                                                      Subscriber Awareness

                                                                      Application Visibility

Subscriber                                                               Traffic Policing
                                                                           Reporting
POLICY / SERVICE ENFORCEMENT
       Enhanced Service Enablement



                                                                                        OTT Web
                                                                                        OTT HD Video

   Standard                                                                             OTT SD Video




                                   GGSN
                                   PGW

Gold




   Standard               •   Granular subscriber   •   Increased revenue   •   New business
                              control / context         opportunity             models
                              awareness
F5’s INTELLIGENT SERVICES FRAMEWORK
     Context-Aware Policy Enforcement
                   DNS                              Centralized Policy Control                                                 IMS

                                                 CSCF      PCRF      AAA       OCS

                                                                                                             HSS      P-CSCF    S-CSCF   SIP AS
                                               Radius, Diameter, SIP, Gx, Gy




                    BIG-IP GTM                           F5 Traffix SDC



                                                                                                             Subscriber Aware Traffic Steering



                                                                                                           VAS       VAS
                                                                                                                                ……          VAS


                                                                                                         Video Optimization, WAP, URL filtering, …

                                                        BIG-IP PEM / CGNAT / FW


                           GGSN



                                                                                                                               Internet
                                        •   Software Controllable Platform
                                        •   Network / Subscriber / Application L4-L7 Awareness
Subscriber                              •   Advanced Firewall / Security
                                        •   High Performance DNS Solution
                                        •   Highly Scalable / High Performance and Extensible Platform
F5’S BIG-IP PLATFORMS
                                   2,000,000                                                                             BIG-IP 10200v
                                                                                                                           2M L7 RPS       VIPRION 4800
                                                                                                                           1M L4 CPS        20M L7 RPS
                                   1,800,000
                                                                                                                          Up to 80G TPUT    10M L4 CPS
                                                                                                                                           Up to 640G TPUT
                                   1,600,000
L7 Requests Per Second (Inf-Inf)




                                   1,400,000

                                                                                                        BIG-IP 4200v
                                   1,200,000
                                                                                                        850k L7 RPS
                                                                                                        300K L4 CPS
                                   1,000,000
                                                                                                        10G L7/L4 TPUT
                                                                                        BIG-IP 2200s
                                    800,000                                             425K L7 RPS
                                                                                        150K L4 CPS
                                                                        BIG-IP 2000s    5G L7/L4 TPUT
                                    600,000
                                                                        212K L7 RPS
                                                                         75K L4 CPS
                                    400,000                             5G L7/L4 TPUT

                                    200,000
                                                Up to 3Gbps TPUT

                                          0
                                               BIG-IP Virtual Edition   BIG-IP 2000s    BIG-IP 2200s     BIG-IP 4200v    BIG-IP 10200v     VIPRION 4800
© 2012 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other
  F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or
  affiliation, express or implied, claimed by F5.

More Related Content

What's hot

Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 Networks
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
F5 Networks
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
F5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
F5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
F5 Networks
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
F5NetworksAPJ
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
F5 Networks
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5
Shashi Kiran
 
F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 Networks
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfmvfmindia
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
F5 Networks
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
MarketingArrowECS_CZ
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
World Wide Technology
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
F5 Networks
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
patmisasi
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
F5 Networks
 

What's hot (20)

Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5
 
F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 

Viewers also liked

The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
F5 Networks
 
הדרכה מבוססת אינטרנט Wbt - Web based training
הדרכה מבוססת אינטרנט  Wbt - Web based training הדרכה מבוססת אינטרנט  Wbt - Web based training
הדרכה מבוססת אינטרנט Wbt - Web based training
Lior Rotkovitch
 
Denial of Service
Denial of ServiceDenial of Service
Denial of Service
MarketingArrowECS_CZ
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
F5 Networks
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
F5 Networks
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks
 
HK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - finalHK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - final
Juni Yan
 
F5 Link controller Configuration
F5 Link controller Configuration F5 Link controller Configuration
F5 Link controller Configuration
PCCW GLOBAL
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the Network
F5 Networks
 
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
Biju M R
 
Ocs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesOcs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesThiago Gutierri
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks
 
F5 study guide
F5 study guideF5 study guide
F5 study guideshimera123
 

Viewers also liked (13)

The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
הדרכה מבוססת אינטרנט Wbt - Web based training
הדרכה מבוססת אינטרנט  Wbt - Web based training הדרכה מבוססת אינטרנט  Wbt - Web based training
הדרכה מבוססת אינטרנט Wbt - Web based training
 
Denial of Service
Denial of ServiceDenial of Service
Denial of Service
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
HK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - finalHK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - final
 
F5 Link controller Configuration
F5 Link controller Configuration F5 Link controller Configuration
F5 Link controller Configuration
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the Network
 
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
OCS DCCA- Credit pooling and multiplier concepts - Call flow explanation v1.0
 
Ocs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesOcs F5 Bigip Bestpractices
Ocs F5 Bigip Bestpractices
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 study guide
F5 study guideF5 study guide
F5 study guide
 

Similar to BIG-IP Policy Enforcement Manager

Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
Radisys Corporation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
John Rhoton
 
Citrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More AvailabilityCitrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More Availability
dataplex systems limited
 
Scaling Diameter for LTE
Scaling Diameter for LTEScaling Diameter for LTE
Scaling Diameter for LTEAcmePacket
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
Juniper Networks
 
Nevmug Green Pages Cisco Nexus January 2009
Nevmug   Green Pages Cisco   Nexus January 2009Nevmug   Green Pages Cisco   Nexus January 2009
Nevmug Green Pages Cisco Nexus January 2009
csharney
 
Ensuring Privacy & Transparency within Hybrid Clouds
Ensuring  Privacy & Transparency within Hybrid Clouds Ensuring  Privacy & Transparency within Hybrid Clouds
Ensuring Privacy & Transparency within Hybrid Clouds
Marcin Kotlarski
 
Disa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 HjsDisa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 Hjs
GovCloud Network
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionDigicomp Academy AG
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologiesdoan_slideshares
 
GoS presentation MBW 2012
GoS presentation MBW 2012GoS presentation MBW 2012
GoS presentation MBW 2012
GoS Networks Ltd
 
Technology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS OpportunitiesTechnology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS Opportunities
Radisys Corporation
 
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelMobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelUntil ROI
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overviewsumitkhandelwal
 
Aerohive Corporate Brochure
Aerohive Corporate BrochureAerohive Corporate Brochure
Aerohive Corporate BrochureAerohive
 
Enterasys OneFabric Brochure
Enterasys OneFabric BrochureEnterasys OneFabric Brochure
Enterasys OneFabric Brochure
Arrow ECS UK
 
Private Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarPrivate Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarExponential_e
 

Similar to BIG-IP Policy Enforcement Manager (20)

Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Citrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More AvailabilityCitrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More Availability
 
Scaling Diameter for LTE
Scaling Diameter for LTEScaling Diameter for LTE
Scaling Diameter for LTE
 
NFV SDN for carriers
NFV SDN for carriersNFV SDN for carriers
NFV SDN for carriers
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Nevmug Green Pages Cisco Nexus January 2009
Nevmug   Green Pages Cisco   Nexus January 2009Nevmug   Green Pages Cisco   Nexus January 2009
Nevmug Green Pages Cisco Nexus January 2009
 
Ensuring Privacy & Transparency within Hybrid Clouds
Ensuring  Privacy & Transparency within Hybrid Clouds Ensuring  Privacy & Transparency within Hybrid Clouds
Ensuring Privacy & Transparency within Hybrid Clouds
 
Disa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 HjsDisa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 Hjs
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introduction
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologies
 
GoS presentation MBW 2012
GoS presentation MBW 2012GoS presentation MBW 2012
GoS presentation MBW 2012
 
Technology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS OpportunitiesTechnology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS Opportunities
 
10 fn s16
10 fn s1610 fn s16
10 fn s16
 
10 fn s16
10 fn s1610 fn s16
10 fn s16
 
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelMobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overview
 
Aerohive Corporate Brochure
Aerohive Corporate BrochureAerohive Corporate Brochure
Aerohive Corporate Brochure
 
Enterasys OneFabric Brochure
Enterasys OneFabric BrochureEnterasys OneFabric Brochure
Enterasys OneFabric Brochure
 
Private Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarPrivate Clouds - Business Agility Seminar
Private Clouds - Business Agility Seminar
 

More from F5 Networks

F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
F5 Networks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
F5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
F5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
F5 Networks
 
BIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformBIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware Platform
F5 Networks
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
F5 Networks
 

More from F5 Networks (11)

F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
 
BIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformBIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware Platform
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

BIG-IP Policy Enforcement Manager

  • 1. BIG-IP POLICY ENFORCEMENT MANAGER OVERVIEW February 2013
  • 2. F5’s INTELLIGENT SERVICES FRAMEWORK F5 makes the connected world run better F5 Solutions Available Today: • Policy Enforcement User Community Intelligent Ecosystem DevCentral • Mobile Optimization Solution Programmable/Extensible • Diameter Signaling & Interworking iRules iControl iApps Customizable • DNS Delivery Services Ecosystem • Advanced Firewall Service Provider Optimize Intelligent • Carrier-Grade NAT Integrated Secure • Application Delivery Controller Context aware Monetize • Local and Global Load Balancer Foundation TMOS • Mobile User and Application Scale Access Management Hardware Software
  • 3. MOBILE INTERNET 3.0 SMS Other Voice SMS Other Voice 1 Business Model • Games • Location-Based • Music Services Transformation • Advertising • Banking, • Gambling Commerce, • Broadcast TV • Healthcare • Payments
  • 4. TODAY’S MOBILE NETWORKS ARE STATIC Video optimization WAP Gateway Transparent caching DNS PCRF AAA OCS CSCF Radius, Diameter, DNS, SIP Control Plane Services Value-Added Services (VAS) RTR DPI FW CGN RTR GGSN PGW Internet Challenges • Complex architecture…hard to scale • Results in high CapEx and OpEx Subscriber • Difficult to add new services (requires changes to multiple elements, VLAN management…)
  • 5. SERVICES CONSOLIDATION AND OPTIMIZATION Network Optimization Video WAP Transparent DNS PCRF AAA OCS CSCF optimization Gateway caching Radius, Diameter, DNS, SIP Control Plane Services Value Added Services (VAS) One Platform Policy Gi Firewall CGNAT WAP 2.0 URL Filtering DDoS DNS Enforcement Offload Mitigation Services Internet • Built for new application • Application fluency and Subscriber centric network extensibility • Full Proxy – visibility and control
  • 6. F5’s NEW BIG-IP POLICY ENFORCEMENT MANAGER Intelligent Services Framework Optimize Service providers need a scalable, reliable control plane, data plane, and application plane to satisfy customers who demand applications and mobile devices that strain the signaling network. Intelligent Traffic Management Secure FW PEM CGNAT Security threats are rising, but F5 helps protect entire infrastructure and scales to perform under demanding conditions. Optimize Secure Monetize Monetize Operators struggling with an explosion of data traffic and Service Provider OTT, F5 solutions enable service providers to intelligently HW / SW manage data traffic, conserve network resources, and quickly deliver more profitable services. High Availability Highly Scalable
  • 7. BIG-IP POLICY ENFORCEMENT MANAGER Dynamically manages traffic and subscribers in real time to optimize QoE and minimize congestion in the network Value Added Services (VAS) Centralized Policy Control Video WAP Transparent optimization Gateway caching PCRF AAA OCS CSCF Radius, Diameter, SIP, Gx • Analytics • Charging • Provisioning • Quota Management BIG-IP PEM GGSN PGW Internet Subscriber Awareness Application Visibility Subscriber Traffic Policing Reporting
  • 8. POLICY / SERVICE ENFORCEMENT Enhanced Service Enablement OTT Web OTT HD Video Standard OTT SD Video GGSN PGW Gold Standard • Granular subscriber • Increased revenue • New business control / context opportunity models awareness
  • 9. F5’s INTELLIGENT SERVICES FRAMEWORK Context-Aware Policy Enforcement DNS Centralized Policy Control IMS CSCF PCRF AAA OCS HSS P-CSCF S-CSCF SIP AS Radius, Diameter, SIP, Gx, Gy BIG-IP GTM F5 Traffix SDC Subscriber Aware Traffic Steering VAS VAS …… VAS Video Optimization, WAP, URL filtering, … BIG-IP PEM / CGNAT / FW GGSN Internet • Software Controllable Platform • Network / Subscriber / Application L4-L7 Awareness Subscriber • Advanced Firewall / Security • High Performance DNS Solution • Highly Scalable / High Performance and Extensible Platform
  • 10. F5’S BIG-IP PLATFORMS 2,000,000 BIG-IP 10200v 2M L7 RPS VIPRION 4800 1M L4 CPS 20M L7 RPS 1,800,000 Up to 80G TPUT 10M L4 CPS Up to 640G TPUT 1,600,000 L7 Requests Per Second (Inf-Inf) 1,400,000 BIG-IP 4200v 1,200,000 850k L7 RPS 300K L4 CPS 1,000,000 10G L7/L4 TPUT BIG-IP 2200s 800,000 425K L7 RPS 150K L4 CPS BIG-IP 2000s 5G L7/L4 TPUT 600,000 212K L7 RPS 75K L4 CPS 400,000 5G L7/L4 TPUT 200,000 Up to 3Gbps TPUT 0 BIG-IP Virtual Edition BIG-IP 2000s BIG-IP 2200s BIG-IP 4200v BIG-IP 10200v VIPRION 4800
  • 11. © 2012 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5.