F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Torontopatmisasi
Flexible, Scalable Infrastructures with F5
Presented at Scalar Decisions' lunch on June 4th to learn about F5's new ScaleN Enabled BIG-IP Platforms and latest features in BIG-IP v11.3, which includes new application delivery firewall, SSL enhancements, and DNS visibility and reporting for improved application security and traffic management.
F5 enhances suite of DNS services with added scalability and security. Complete DNS solution improves overall performance and reduces costs for enterprise customers.
Get more versatile and scalable protection with F5 BIG-IPF5NetworksAPJ
- Better protect against costly failures in outbound web security
- Improve scalability, availability, performance, and user experience
- Consolidate application access, secure web access, reducing network footprint and device management
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
February 2014 Update on F5 Synthesis Program, delivered by Pat Fiorino in Toronto at the Hockey Hall of Fame. Prepared for IT decision- makers and administrators.
F5 Networks announced a free trial version of its new virtual appliance, the BIG-IP Local Traffic Manager (LTM) Virtual Edition (VE). The combination of virtual and physical Application Delivery Controllers (ADCs) is a major milestone in delivering on F5’s vision for dynamic IT infrastructure.
F5 helps Communications Service Providers meet unprecedented growth in mobile traffic with new DNS services. F5’s intelligent Domain Name System (DNS) architecture enables CSPs to build flexible, secure, and scalable IP-based networks.
https://f5.com/solutions/enterprise/reference-architectures/intelligent-dns-scale
DNS is the backbone of the Internet. It allows humans to find domain names like www.f5.com instead of the numerical IP addresses web servers require. It is also one of the most vulnerable points in your network. DNS failures account for 41 percent of web downtime, so keeping your DNS available is essential to your business. F5 can help you manage DNS's rapid growth and avoid outages with end-to-end solutions that increase the speed, availability, scalability, and security of your DNS infrastructure. Plus, our solution enables you to consolidate DNS services onto fewer devices, which are easier to secure and manage than traditional DNS deployments
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDSorensenCPR
This slideshow gives an overview of how F5's BIG-IP Application Delivery Controllers protect customers' DNS infrastructure against various attacks by implementing a unique dynamic security signing policy.
F5 and Infoblox deliver complete secured DNS infrastructureDSorensenCPR
F5 and Infoblox have partnered to develop a solution to simplify and speed deployment of the Domain Name System Security Extensions (DNSSEC). F5 and Infoblox together deliver the market’s only fully integrated and complete DNSSEC solution including high-performance DNS and GSLB functions, all supporting signed DNSSEC data. This provides customers a scalable, manageable, and secure DNS infrastructure that is equipped to withstand DNS attacks. The solution is a combination of Infoblox’s purpose-built appliances that deliver highly reliable, manageable and secure DNS services with built-in, automated DNSSEC features, and F5 BIG-IP Global Traffic Manager appliances optimized with hardware acceleration facilitating real-time signing of DNSSEC signature queries.
Integrating Infrastructure as Code into a Continuous Delivery Pipeline | AWS ...Amazon Web Services
Ansible is a simple, but powerful automation tool with an agentless footprint that allows for the definition of architecture, intent, and policy as code that can be deployed across both on-prem and cloud infrastructure. This enables customers to extend their enterprise and applications into AWS in a way that maintains a consistent, secure posture as part of a continuous delivery pipeline. Customers can then natively integrate with AWS to seamlessly configure and deploy a range of AWS services such as Amazon Aurora, Amazon Redshift, Amazon EMR, Amazon Athena, Amazon CloudFront, Amazon Route 53, and Elastic Load Balancing from within Red Hat OpenShift across a secure, consistent hybrid cloud infrastructure. In this session, we will demonstrate how infrastructure can be instantiated with code as part of a continuous delivery pipeline and describe how that integrates with an OpenShift hybrid cloud deployment. Learn More: https://aws.amazon.com/government-education/
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Torontopatmisasi
Flexible, Scalable Infrastructures with F5
Presented at Scalar Decisions' lunch on June 4th to learn about F5's new ScaleN Enabled BIG-IP Platforms and latest features in BIG-IP v11.3, which includes new application delivery firewall, SSL enhancements, and DNS visibility and reporting for improved application security and traffic management.
F5 enhances suite of DNS services with added scalability and security. Complete DNS solution improves overall performance and reduces costs for enterprise customers.
Get more versatile and scalable protection with F5 BIG-IPF5NetworksAPJ
- Better protect against costly failures in outbound web security
- Improve scalability, availability, performance, and user experience
- Consolidate application access, secure web access, reducing network footprint and device management
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
February 2014 Update on F5 Synthesis Program, delivered by Pat Fiorino in Toronto at the Hockey Hall of Fame. Prepared for IT decision- makers and administrators.
F5 Networks announced a free trial version of its new virtual appliance, the BIG-IP Local Traffic Manager (LTM) Virtual Edition (VE). The combination of virtual and physical Application Delivery Controllers (ADCs) is a major milestone in delivering on F5’s vision for dynamic IT infrastructure.
F5 helps Communications Service Providers meet unprecedented growth in mobile traffic with new DNS services. F5’s intelligent Domain Name System (DNS) architecture enables CSPs to build flexible, secure, and scalable IP-based networks.
https://f5.com/solutions/enterprise/reference-architectures/intelligent-dns-scale
DNS is the backbone of the Internet. It allows humans to find domain names like www.f5.com instead of the numerical IP addresses web servers require. It is also one of the most vulnerable points in your network. DNS failures account for 41 percent of web downtime, so keeping your DNS available is essential to your business. F5 can help you manage DNS's rapid growth and avoid outages with end-to-end solutions that increase the speed, availability, scalability, and security of your DNS infrastructure. Plus, our solution enables you to consolidate DNS services onto fewer devices, which are easier to secure and manage than traditional DNS deployments
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDSorensenCPR
This slideshow gives an overview of how F5's BIG-IP Application Delivery Controllers protect customers' DNS infrastructure against various attacks by implementing a unique dynamic security signing policy.
F5 and Infoblox deliver complete secured DNS infrastructureDSorensenCPR
F5 and Infoblox have partnered to develop a solution to simplify and speed deployment of the Domain Name System Security Extensions (DNSSEC). F5 and Infoblox together deliver the market’s only fully integrated and complete DNSSEC solution including high-performance DNS and GSLB functions, all supporting signed DNSSEC data. This provides customers a scalable, manageable, and secure DNS infrastructure that is equipped to withstand DNS attacks. The solution is a combination of Infoblox’s purpose-built appliances that deliver highly reliable, manageable and secure DNS services with built-in, automated DNSSEC features, and F5 BIG-IP Global Traffic Manager appliances optimized with hardware acceleration facilitating real-time signing of DNSSEC signature queries.
Integrating Infrastructure as Code into a Continuous Delivery Pipeline | AWS ...Amazon Web Services
Ansible is a simple, but powerful automation tool with an agentless footprint that allows for the definition of architecture, intent, and policy as code that can be deployed across both on-prem and cloud infrastructure. This enables customers to extend their enterprise and applications into AWS in a way that maintains a consistent, secure posture as part of a continuous delivery pipeline. Customers can then natively integrate with AWS to seamlessly configure and deploy a range of AWS services such as Amazon Aurora, Amazon Redshift, Amazon EMR, Amazon Athena, Amazon CloudFront, Amazon Route 53, and Elastic Load Balancing from within Red Hat OpenShift across a secure, consistent hybrid cloud infrastructure. In this session, we will demonstrate how infrastructure can be instantiated with code as part of a continuous delivery pipeline and describe how that integrates with an OpenShift hybrid cloud deployment. Learn More: https://aws.amazon.com/government-education/
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
Thinking about SDN and whether it is the right approach for your organization? Have you heard about Cisco’s Application Centric Infrastructure and F5 Synthesis yet? The path to radically simplify and accelerate application deployment and datacenter agility can be a phased approach that leverages your existing investment. Rapid delivery of applications to anyone, anywhere, at any time is complex—and many businesses struggle with it.
Moderne Serverless-Computing-Plattformen sind in aller Munde und stellen ein Programmiermodell zur Verfügung, wo sich der Nutzer keine Gedanken mehr über die Administration der Server, Storage, Netzwerk, virtuelle Maschinen, Hochverfügbarkeit und Skalierbarkeit machen brauch, sondern sich auf das Schreiben von eigenen Code konzentriert. Der Code bildet die Geschäftsanforderungen modular in Form von kleinen Funktionspaketen (Functions) ab. Functions sind das Herzstück der Serverless-Computing-Plattform. Sie lesen von der (oft Standard-)Eingabe, tätigen ihre Berechnungen und erzeugen eine Ausgabe. Die zu speichernden Ergebnisse von Funktionen werden in einem permanenten Datastore abgelegt, wie z.B. der Autonomous Database gespeichert. Die Autonomous Database besitzt folgende drei Eigenschaften self-driving, self-repairing und self-securing, die für einen modernen Anwendungsentwicklungsansatz benötigt werden.
This hands on workshop for OpenContrail will be led by Sreelakshmi Sarva & Aniket Daptari.
This is a labs session so we will have hard RSVP limits. Please RSVP only if you are confident that you will be able to attend.
About Sreelakshmi Sarva
Sree is currently working as part of solution engineering team at Juniper’s Contrail team. She is responsible for delivering & managing SDN solutions & partnerships relating to Contrail. She has been with Juniper for the last 13 years working on various Routing, Switching, Network programmability & virtualization platforms. Prior to Juniper, She worked at Nortel networks in the Systems Engineering group. Sree received her Masters in Computer Science from University of Texas at Dallas and Bachelor’s in Computer Science from India.
About Aniket Daptari
Aniket is currently working as part of Juniper Networks' Contrail Cloud Solutions team. He is responsible for delivering SDN solutions and technology partnerships related to Contrail. He has been with Juniper for the last 3 years working on various Network programmability & virtualization platforms. Prior to Juniper, he worked at Cisco Systems in the Internet Systems Business Unit (Catalyst 6500). Aniket received his Masters in Computer Science from University of Southern California and a graduate certificate in Management Science and Engineering from Stanford University.
Course Abstract
This session will be the first of a series of OpenContrail hands-on tutorials for developers who want to get deep into OpenContrail code.
This “Basic OpenContrail Programming” Hands-on Session will focus on making developers proficient in writing and contributing code for our OpenContrail Project.
Session will cover the following areas
1) Contrail Overview
· Use Cases
· Architecture recap
2) Contrail Hands on
· Demo + Hands on - Configuration , VN, VM, Network Policies etc
· DevStack introduction
Cisco ACI & F5 Integrate to Transform the Data CenterF5NetworksAPJ
To meet business expectations without compromising on security, availability, or performance, today’s IT organizations are expected to deliver applications with a speed and efficiency that was unimaginable just a few years ago. To keep pace, you must transform your data
center infrastructure to support the rapid provisioning and scaling of network and application services. With the joint solution of Cisco Application Centric Infrastructure (ACI) and F5 Synthesis™, you can operationalize the network and accelerate application deployment.
Cilium:: Application-Aware Microservices via BPFCynthia Thomas
Intro to Cilium Microservices Security with Kubernetes Integration
Open Source Cilium website: cilium.io
GH: github.com/cilium/cilium
Join our Slack! cilium.herokuapp.com
Follow us on Twitter!
@ciliumproject
@_techcet_
View IT operations as a flow of data (Sources of Truth) thru work-cells (automation processes) to deliver value to the customer.
There should be only one source of truth for every piece of configuration data.
Device configurations are poor source of truth.
DEVNET-1128 Cisco Intercloud Fabric NB Api's for Business & ProvidersCisco DevNet
Get to know the latest Rest API's and their Capabilities for Intercloud Fabric Business & Provider Editions. Understand how these API's can be used to integrate ICF into your Business Applications and provide the advantages of a true Hybrid Cloud to your end-users.
Securing Your Apps & APIs in the CloudOlivia LaMar
Hybrid and multi-cloud architectures are becoming the expected standard for architecture teams to buildout and for operations teams to maintain and deploy. Ever faster DevOps workflows are now an expectation for any digital enterprise, not a goal. And the code DevOps teams are pushing out is typically now packaged in containers, creating an increasingly distributed application landscape.
So how can organizations still practice effective application security policy without impacting or crippling their modernization initiatives? NGINX can help with that.
These slides will cover:
NGINX Plus as an integrated, cloud-native Load Balancer and API Gateway in NGINX Plus
NGINX App Protect as the new cloud-native WAF extension for NGINX Plus
Demo of both working in tandem to set:
Edge routing policy
Edge Security Policy
And Extending down to Granular, Per-App Security Policy
PLNOG 17 - Grzegorz Kornacki - F5 and OpenStackPROIDEA
F5 is a top Security and Application Delivery Controller vendor. OpenStack is a free and open-source software platform for cloud computing, mostly deployed as an infrastructure-as-a-service (IaaS).
This seemingly unrelated disciplines have a lot of in common. This session will explain what F5 can do for OpenStack, and what OpenStack can do for F5. We will touch upon: F5 platform virtualization, deployment automation, LBaaS and OpenStack security.
Everything you need to know about creating, managing and debugging Java applications on IBM Bluemix. This presentation covers the features the IBM WebSphere Application Server Liberty Buildpack provides to make Java development on the cloud easier. It also covers the Eclipse tooling support including remote debugging, incremental update, etc.
2011-11-03 Intelligence Community Cloud Users GroupShawn Wells
Hosted by TMA, spoke about Red Hat's virtualization portfolio, RHEV & KVM technical updates (Xen vs KVM, sVirt), RHEV 3, and security automation (OpenSCAP).
The objective of this project is to make servers of web service, ftp service, VoIP video call service, and manage them centrally from a host in private connection or from remote connection. We will also monitor the services, we are going to install, from this central PC. If there is a problem found like no connectivity, then the monitor agent will notify the network administrator showing the error message.
Similar to F5 Meetup presentation automation 2017 (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
5. F5 iApps provides:
• L4-7 Config Abstraction
• Full platform capability
• Site-specific customization
Resulting in:
• Fast time to value
• Faster time to change
• Reduced operation risk
Admin
Application
Experience:
Performance, High-
Availability, and Security
RouterSwitch
L2 – L3
ADC ADC
L4 – L7
ADC
Network
Application
Services
Policy
ACCESS
&
IDENTIT
Y
FIREWAL
L
CONTEX
T
LOAD-
BALANCIN
G
GATEWA
Y
SERVICE
S
SECURIT
Y
OPTIMIZ-
ATION
DDoS
PROTECTI
ON
MOBILIT
Y
iApp
6. F5 iWorkflow Provides:
• L4-7 Service Abstraction
• Tenant/Provider Service Model
• RBAC
• Licensing
Resulting in:
• Simplified integration
• Reduced deployment complexity
• Repeatability
Admin
Application
Experience:
Performance, High-
Availability, and Security
ADC ADC ADC
L4-7 Services
Application
Services
Policy
ACCESS
&
IDENTIT
Y
FIREWAL
L
CONTEX
T
LOAD-
BALANCIN
G
GATEWA
Y
SERVICE
S
SECURIT
Y
OPTIMIZ-
ATION
DDoS
PROTECTI
ON
MOBILIT
Y
Service Catalog
HTTP Simple
HTTPS Simple
HTTPS Advanced
HTTPS PCI
iAppiWF
9. iRules iControl iApps iCall tmsh
Data Plane
Programmability
Programmable
Management API in
SOAP and REST
Enterprise Apps,
Orchestration and
BIG-IQ
Event based
handlers
On-box Tcl based
shell and
programming
utility
DevCentral
10. TMOS Platforms
VIPRION Platform
BIG-IP Platform
BIG-IP Virtual Edition
DevCentral
What really makes
programmability valuable
TMSH
The CLI that does it all
iControl
One API to rule them all
iApps
Packaged business logic and
templatization
iCall
Events, triggers and handlers
for the control-plane
iRules
Real-time, full-proxy events for
the data-plane
User Interfaces
iControlTMSH GUI (TMUI)
TMOS Proxy
TMOS Microkernel:
(Data Plane)
iRules
TMOS Management:
(Control Plane)
iCalliApp
DevCentral Customer/
Developer
13. Security
Policy
Admin
Provisioning
Tool
iApps
• Build BIG-IP LTM policies & deploy across multiple
environments with consistency
• Deploy ASM/APM/AFM polices using the App-services
iApps
Manage & deploy security policies consistently across your infrastructure or for your tenants
• Forgetting, or missing, a device when patching or deploying secure config could
expose your corporation to attackers both internal and external.
BIG-IP devices
Development
environment
Test
environment
Production
environment
14. BIG-IP
• Automate routing traffic & connection termination by
managing LTM and BIG-IP DNS configurations
• Upgrade/Deploy new applications on the BIG-IP
consistently & with low risk
Manage Blue-Green deployments during applications roll up for zero down time
Data Center 1 Data Center 2
15. Cloud Migration
• Provision & Automate BIG-IP infrastructure& configurations in
VMware, OpenStack, AWS, Azure
• Using CFT, HEAT templates and so on
• An application can begin in VMware environment but
expand to AWS & Azure.
Orchestrate & Automate in multiple private & public cloud environments
This is where iApps come into play. iApps are the templatization of application delivery policy. iApps take all the rich functionality that we learned from our Alliance Partnerships, that same application fluency that formed the deployment guides, and turns them into an intuitive, wizard-style implementation. As an example, I saw this demo myself in one of our Technology Centers, the Exchange Deployment Guide, all 119 pages of instruction, which takes a typical admin a week to work through, this was boiled down to 5 simple questions. In just a couple of minute, the same complex, yet functionally rich implementation has taken place and, here’s a really important part, no functionality was sacrificed. You’ll see the market followers out there pushing ease of deployment, but without F5’s history and application fluency, they will fall short of expectation.
This is where iApps come into play. iApps are the templatization of application delivery policy. iApps take all the rich functionality that we learned from our Alliance Partnerships, that same application fluency that formed the deployment guides, and turns them into an intuitive, wizard-style implementation. As an example, I saw this demo myself in one of our Technology Centers, the Exchange Deployment Guide, all 119 pages of instruction, which takes a typical admin a week to work through, this was boiled down to 5 simple questions. In just a couple of minute, the same complex, yet functionally rich implementation has taken place and, here’s a really important part, no functionality was sacrificed. You’ll see the market followers out there pushing ease of deployment, but without F5’s history and application fluency, they will fall short of expectation.
All these programmability options are not in silos
We have TMSH which is like CLI on the box with pretty good TCL scripting capabilities
iControl REST and SOAP you guys must be aware off
iApps Which is packaged business logic we will talk about the same
iCall this is for visibility and conrtrol
iRule this to manipulate the application traffic both at server side and client side.
Like I said all these capabilities are not in Silos they are very well used to gether.
Device = Physical BIG-IP and VE
RPM (Node.js) Libraries:
Provisioning Settings & Reset Download: https://devcentral.f5.com/d/f5-devops-library-provisioning-230
Provision BIG-IP device
NTP servers & timezone
Licensing BIG-IP using single registration key, supports BYOL
Syslog server
FQDN
Device name
DNS search domain list
Factory Reset BIG-IP Device
Factory reset via standard iControl REST API
Eliminates all data plane configuration, device trust, and system settings
Management IP and licenses are not reset
HA Pairing Download: https://devcentral.f5.com/d/f5-devops-library-clustering-231
Provision a basic BIG-IP HA pair
2 device Active/Standby cluster
Single default traffic group
Automatic cluster synchronization (CMI)
Creation of vLAN and self-IP for HA sync
Puppet support iApp v1 (TCL) deployments. NOT iApps LX (Node.js).
Puppet Proxy is needed when Puppet Agent cannot be loaded directly on the managed device.
Target wrote a Chef cookbook which is on their own GitHub repository (not on F5’s GitHub)
Ansible module docs: https://github.com/F5Networks/f5-ansible/tree/master/docs/modules