SlideShare a Scribd company logo
F5 APPLICATION BRIEF
1
WEB SERVERS
Description of the Application
Web servers remain an integral part of enterprise network and e-commerce strategies. Web servers run critical applications and provide
valuable content, revolutionizing the way that organizations provide information, services and products today. Employees, partners, clients
and customers rely on the constant availability of the services and information provided by web servers. As the scope of the Internet and the
integration of business alliances increase, so does the demand on web servers and the role they play in the success of the organization.
Both large and small organizations face the challenge of deploying web sites and web applications while ensuring secure and optimized
delivery of those applications. Choosing a cost effective solution that meets these challenges while allowing for growth is extremely
important. Key challenges include:
Increasing Security - Web site and network security have recently become both more complex and more crucial to web server deployments.
New attacks such as cross-site scripting, parameter tampering, and SQL injection exploit holes in network security and application design,
highlighting an organization’s need to increase application level security to assure resource availability.
Improving ROI - A pattern of repeatedly acquiring the latest technology or frequently buying excess server capacity can ruin an
organization’s operating margins - with little or no improvement in web applications performance and delivery. Organizations need scalable
tools that monitor capacity and hardware that manages and redistributes access to server resources instantaneously and intelligently.
Ensuring High Availability - Constant availability is a major concern for any enterprise deploying web servers, whether an e-commerce
company relying on web applications for revenue, or a Services organization relying on information delivery over the Internet. Traditionally,
clustering technology was implemented to ensure the availability of web servers. However, as usage increased and larger deployments
became common, added network traffic and limited health checking capabilities left organizations searching for more comprehensive
solutions.
Providing Scalability - Web servers are high-traffic systems that need to provide consistent peak performance. Organizations seek
technology that allows them to scale wisely, adding new servers as performance demands increase. Most web servers offer limited scalability
through the use of clustering technology. However, in large deployments, the CPU-intensive processing that clustering places on the servers
makes this solution impractical.
F5 Solution Overview
F5’s proven and widely deployed solutions allow organizations to increase the return on current investments and decrease the need for
additional expenditure by providing flexible, intelligent distribution mechanisms to improve the performance and security of web servers and
web applications. F5’s application traffic management products increase the existing benefits of deploying web servers by providing an easy-
to-use solution for optimizing, managing and securing global and local area traffic. For the remote workforce, the FirePass controller, F5’s
award-winning SSL VPN device, ensures that employees and trusted partners can securely access web servers on the corporate network from
any device in any location. The TrafficShield web Application Firewall enhances deployments by protecting web servers at the application layer
from general and targeted attacks, while allowing only valid and authorized application transactions on the network.
With its comprehensive feature set, including Intelligent Compression, TCP Express, and Fast Cache, version 9 of the BIG-IP system can offload
a number of different services from web servers, improving performance for the end user more than 70% and freeing the servers to perform
their primary role: serving content. The BIG-IP system provides the industry’s most intelligent HTTP compression capabilities. Using the
Universal Inspection Engine for deep packet inspection and the iRules policy-based engine, the BIG-IP device is able to selectively compress
traffic based on an organization’s needs. These compression features help the enterprise realize large performance gains and bandwidth
reduction, maximizing return on investment.
The BIG-IP system further enhances web server deployments with TCP Express optimization features. Utilizing separate client and server side
TCP stacks, TMOS independently optimizes the connection on both sides, improving end user performance for both broadband and dial-up
clients while optimizing server-side data transmission.
Organizations integrating the BIG-IP solution with web server deployments can achieve significant server connection offload with the
memory-based caching module called Fast Cache. Fast Cache provides the flexibility and control needed to extend caching on a per
application basis, adapting to an organization’s specialized caching needs and increasing end user performance for frequently accessed pages.
Challenges to the Application Type
F5 APPLICATION BRIEF
2
WEB SERVERS
F5 Solution Overview - continued
Benefits
F5’s BIG-IP traffic management solution provides the foundation for the secure delivery of enterprise web services. The BIG-IP device’s SSL
offloading functionality gives organizations the ability to deploy SSL decryption and encryption on more of their sites and applications while
decreasing web server load. Meanwhile, advanced health checking capabilities enable the BIG-IP product to test applications to ensure
their availability and to validate functionality. The BIG-IP product’s comprehensive feature set provides protection from well-known security
threats such as DDOS and adds proactive capabilities to thwart future attack types.
F5’s FirePass controller provides secure access to web server deployments for the remote workforce. Once authenticated by the FirePass
device, users pass through the corporate firewall and are able to access web-enabled applications and content from any platform on any
device in any location without having to re-authenticate for multiple resources. The FirePass controller not only delivers and secures access
to web servers, but also allows for granular control of access to resources on a group bases. And for users accessing web servers remotely,
the FirePass controller’s caching and compression capabilities provide additional performance enhancement and server offload while securely
delivering content.
F5’s solution further enhances web application security with the TrafficShield Application Firewall. Using a positive security model (“deny
all unless allowed”), the TrafficShield product provides comprehensive protection for web servers and web applications. By generating an
extremely accurate model of all legitimate user interaction with an application, the TrafficShield device is able to filter all application requests
and deny anything that is not legitimate user activity, including Buffer Overflow, cross-site scripting, and cookie poisoning.
Fast Cache, TCP Express and Intelligent Compression features optimize performance and maximize ROI - Integrating the BIG-IP
solution with web servers provides a specialized Layer 4-7 architecture with superior processing power, optimizing application speed and
Quality of Service levels. The BIG-IP version 9 Fast Cache enhances performance gains for end users while offloading up to 98% of server
connections. Compressing a variety of file types, including HTML, XML, JavaScript, and J2EE applications, Intelligent Compression features
provide bandwidth savings for web server deployment, dramatically improving ROI for the enterprise. Utilizing independent client and server
side TCP stacks, BIG-IP TCP Express features optimize client side delivery while maintaining server-optimized connections on the inside of the
network. This optimization takes place up and down the entire stack, from the transport layer to the protocol and application layers, taking
the workload off of the servers for increased server efficiency. The BIG-IP product’s OneConnect feature intelligently manages HTTP sessions
to reduce bandwidth cost by up to 20% and increase the capacity of your back-end server farm.
F5 solutions enhance end-to-end security at every level of web server deployment - The BIG-IP product comes standard
with numerous security features that provide an extremely scalable, highly available and secure solution for both internal and external
applications. BIG-IP can be used to balance both inbound and outbound traffic for devices like firewalls, caches, or routers. It enables
stringent access control, secure administration, and helps resist common attacks. The FirePass SSL VPN extends this level of secure access to
the remote workforce - on any device in any location - without the administrative and cost burden of client side software. The TrafficShield
web Application Firewall provides comprehensive, proactive application layer protection that shields back end systems from application level
security threats aimed at web server deployments.
Centralized SSL acceleration and FIPS improve web server performance and reduce management costs - For encrypted traffic,
the BIG-IP solution provides integrated SSL encryption and decryption capabilities. Offloading processor-intensive SSL transactions from
the front-end servers greatly improves the performance of the server cluster, freeing it to fill more user requests. This solution maximizes
application availability, allows for trouble-free maintenance and reduces administration overhead. By offloading SSL and persistence
functions (processor and server intensive operations) customers do not have to buy expensive hardware to support their applications. The
result is up to 30% savings on hardware costs, with increased application performance. The BIG-IP product is also the first application traffic
management solution with a FIPS (Federal Information Processing Standard) 140-2 Level 2 certified cryptographic/SSL accelerator. F5’s FIPS
products meet higher levels of security standards, required by Government agencies, financial services, and healthcare organizations, by
integrating a tamper-resistant, key protection module and sophisticated key management capabilities. The management cost savings of
centralizing this function on the BIG-IP product, instead of every server, is estimated to be 20 - 25%.
Advanced health checking ensures high availability, improves scalability - The BIG-IP product detects a variety of device failures
to ensure that mission-critical resources are responding properly. Advanced content and application checks such as Extended Content
Verification (ECV) and Extended Application Verification (EAV) simulate an end user request and monitor the true availability of content. With
these advanced health checking capabilities, the BIG-IP product can recognize when a resource is unavailable or underperforming and direct
traffic to another resource. With the BIG-IP product, all of your applications can achieve mission-critical availability (99.999% uptime),
F5 APPLICATION BRIEF
3
WEB SERVERS
Benefits - Continued
while reducing operational complexity and costs. If one service is nearing capacity, scaling it is as simple as adding another instance of the
service to your network and then to the BIG-IP load balancing pool. Thus the BIG-IP product provides a highly scalable solution that allows
enterprises to meet growing organizational demands on web and application resources.
Universal Inspection Engine, iRules and cookie persistence enhance traffic control - Unlike other networking products on the
market, the BIG-IP product can read any value(s) of an IP-based packet header or payload and direct it to the appropriate resource. Based
on precise business criteria and requirements, the Universal Inspection Engine (UIE) and iRules™ allow an organization to easily incorporate
application specific logic into the BIG-IP product, resulting in significant operational efficiencies. The BIG-IP system’s patented cookie
persistence method can insert a cookie on the client, ensuring that users always return to the same web server. Cookie persistence provides
consistent results without constant authentication disruptions, thus increasing end user satisfaction.

More Related Content

What's hot

Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
F5 Networks
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway
 
DataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksDataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance Benchmarks
Ozair Sheikh
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfmvfmindia
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
F5 Networks
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and Integration
IBM Sverige
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
Peter Silva
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
F5 Networks
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
Sarah Duffy
 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
Rui Santos
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
Cisco Canada
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
F5 Networks
 
Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...
Gennadiy Civil
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
Valeri Illescas
 
Data power use cases
Data power use casesData power use cases
Data power use casessflynn073
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 Networks
 
WebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overviewWebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overview
Sarah Duffy
 

What's hot (20)

Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
 
DataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksDataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance Benchmarks
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and Integration
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45Datasheet: WebSphere DataPower Service Gateway XG45
Datasheet: WebSphere DataPower Service Gateway XG45
 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
Data power use cases
Data power use casesData power use cases
Data power use cases
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
WebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overviewWebSphere DataPower B2B Appliance overview
WebSphere DataPower B2B Appliance overview
 

Viewers also liked

E-commerce Primer For Newbies (Not Dummies)
E-commerce Primer For Newbies (Not Dummies)E-commerce Primer For Newbies (Not Dummies)
E-commerce Primer For Newbies (Not Dummies)webhostingguy
 
January 2010 Spam Report
January 2010 Spam ReportJanuary 2010 Spam Report
January 2010 Spam Reportwebhostingguy
 
Wild Apricot Presentation - January 2009
Wild Apricot Presentation - January 2009Wild Apricot Presentation - January 2009
Wild Apricot Presentation - January 2009webhostingguy
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
WebHost Manager 7 User Guide
WebHost Manager 7 User GuideWebHost Manager 7 User Guide
WebHost Manager 7 User Guidewebhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 

Viewers also liked (7)

E-commerce Primer For Newbies (Not Dummies)
E-commerce Primer For Newbies (Not Dummies)E-commerce Primer For Newbies (Not Dummies)
E-commerce Primer For Newbies (Not Dummies)
 
January 2010 Spam Report
January 2010 Spam ReportJanuary 2010 Spam Report
January 2010 Spam Report
 
Wild Apricot Presentation - January 2009
Wild Apricot Presentation - January 2009Wild Apricot Presentation - January 2009
Wild Apricot Presentation - January 2009
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
WebHost Manager 7 User Guide
WebHost Manager 7 User GuideWebHost Manager 7 User Guide
WebHost Manager 7 User Guide
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
File Upload
File UploadFile Upload
File Upload
 

Similar to WEB SERVERS

IBM Application Acceleration Data Sheet
IBM Application Acceleration Data SheetIBM Application Acceleration Data Sheet
IBM Application Acceleration Data Sheet
cathylums
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
GrigoryShkolnik1
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
Array Networks
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
Deivid Toledo
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
F5 Networks
 
Document case study-Systweak - Go4Hosting
Document case study-Systweak - Go4HostingDocument case study-Systweak - Go4Hosting
Document case study-Systweak - Go4Hosting
Go4hosting Web Hosting Provider
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)
Mike Trawick
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 
Final Project.pptx
Final Project.pptxFinal Project.pptx
Final Project.pptx
sheinhtet6
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Citrix
 
Agility Whitepaper
Agility WhitepaperAgility Whitepaper
Agility WhitepaperLinda Wales
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
Cisco Enterprise Networks
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
E.S.G. JR. Consulting, Inc.
 
NGINX Controller: faster deployments, fewer headaches
NGINX Controller: faster deployments, fewer headachesNGINX Controller: faster deployments, fewer headaches
NGINX Controller: faster deployments, fewer headaches
Kangaroot
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance software
pftecsoft
 
Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Preso
faiiqb
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Amazon Web Services
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverviewrehanf5
 

Similar to WEB SERVERS (20)

IBM Application Acceleration Data Sheet
IBM Application Acceleration Data SheetIBM Application Acceleration Data Sheet
IBM Application Acceleration Data Sheet
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
Document case study-Systweak - Go4Hosting
Document case study-Systweak - Go4HostingDocument case study-Systweak - Go4Hosting
Document case study-Systweak - Go4Hosting
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Final Project.pptx
Final Project.pptxFinal Project.pptx
Final Project.pptx
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
 
Agility Whitepaper
Agility WhitepaperAgility Whitepaper
Agility Whitepaper
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
 
NGINX Controller: faster deployments, fewer headaches
NGINX Controller: faster deployments, fewer headachesNGINX Controller: faster deployments, fewer headaches
NGINX Controller: faster deployments, fewer headaches
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance software
 
Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Preso
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverview
 

More from webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...webhostingguy
 

More from webhostingguy (20)

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
 

WEB SERVERS

  • 1. F5 APPLICATION BRIEF 1 WEB SERVERS Description of the Application Web servers remain an integral part of enterprise network and e-commerce strategies. Web servers run critical applications and provide valuable content, revolutionizing the way that organizations provide information, services and products today. Employees, partners, clients and customers rely on the constant availability of the services and information provided by web servers. As the scope of the Internet and the integration of business alliances increase, so does the demand on web servers and the role they play in the success of the organization. Both large and small organizations face the challenge of deploying web sites and web applications while ensuring secure and optimized delivery of those applications. Choosing a cost effective solution that meets these challenges while allowing for growth is extremely important. Key challenges include: Increasing Security - Web site and network security have recently become both more complex and more crucial to web server deployments. New attacks such as cross-site scripting, parameter tampering, and SQL injection exploit holes in network security and application design, highlighting an organization’s need to increase application level security to assure resource availability. Improving ROI - A pattern of repeatedly acquiring the latest technology or frequently buying excess server capacity can ruin an organization’s operating margins - with little or no improvement in web applications performance and delivery. Organizations need scalable tools that monitor capacity and hardware that manages and redistributes access to server resources instantaneously and intelligently. Ensuring High Availability - Constant availability is a major concern for any enterprise deploying web servers, whether an e-commerce company relying on web applications for revenue, or a Services organization relying on information delivery over the Internet. Traditionally, clustering technology was implemented to ensure the availability of web servers. However, as usage increased and larger deployments became common, added network traffic and limited health checking capabilities left organizations searching for more comprehensive solutions. Providing Scalability - Web servers are high-traffic systems that need to provide consistent peak performance. Organizations seek technology that allows them to scale wisely, adding new servers as performance demands increase. Most web servers offer limited scalability through the use of clustering technology. However, in large deployments, the CPU-intensive processing that clustering places on the servers makes this solution impractical. F5 Solution Overview F5’s proven and widely deployed solutions allow organizations to increase the return on current investments and decrease the need for additional expenditure by providing flexible, intelligent distribution mechanisms to improve the performance and security of web servers and web applications. F5’s application traffic management products increase the existing benefits of deploying web servers by providing an easy- to-use solution for optimizing, managing and securing global and local area traffic. For the remote workforce, the FirePass controller, F5’s award-winning SSL VPN device, ensures that employees and trusted partners can securely access web servers on the corporate network from any device in any location. The TrafficShield web Application Firewall enhances deployments by protecting web servers at the application layer from general and targeted attacks, while allowing only valid and authorized application transactions on the network. With its comprehensive feature set, including Intelligent Compression, TCP Express, and Fast Cache, version 9 of the BIG-IP system can offload a number of different services from web servers, improving performance for the end user more than 70% and freeing the servers to perform their primary role: serving content. The BIG-IP system provides the industry’s most intelligent HTTP compression capabilities. Using the Universal Inspection Engine for deep packet inspection and the iRules policy-based engine, the BIG-IP device is able to selectively compress traffic based on an organization’s needs. These compression features help the enterprise realize large performance gains and bandwidth reduction, maximizing return on investment. The BIG-IP system further enhances web server deployments with TCP Express optimization features. Utilizing separate client and server side TCP stacks, TMOS independently optimizes the connection on both sides, improving end user performance for both broadband and dial-up clients while optimizing server-side data transmission. Organizations integrating the BIG-IP solution with web server deployments can achieve significant server connection offload with the memory-based caching module called Fast Cache. Fast Cache provides the flexibility and control needed to extend caching on a per application basis, adapting to an organization’s specialized caching needs and increasing end user performance for frequently accessed pages. Challenges to the Application Type
  • 2. F5 APPLICATION BRIEF 2 WEB SERVERS F5 Solution Overview - continued Benefits F5’s BIG-IP traffic management solution provides the foundation for the secure delivery of enterprise web services. The BIG-IP device’s SSL offloading functionality gives organizations the ability to deploy SSL decryption and encryption on more of their sites and applications while decreasing web server load. Meanwhile, advanced health checking capabilities enable the BIG-IP product to test applications to ensure their availability and to validate functionality. The BIG-IP product’s comprehensive feature set provides protection from well-known security threats such as DDOS and adds proactive capabilities to thwart future attack types. F5’s FirePass controller provides secure access to web server deployments for the remote workforce. Once authenticated by the FirePass device, users pass through the corporate firewall and are able to access web-enabled applications and content from any platform on any device in any location without having to re-authenticate for multiple resources. The FirePass controller not only delivers and secures access to web servers, but also allows for granular control of access to resources on a group bases. And for users accessing web servers remotely, the FirePass controller’s caching and compression capabilities provide additional performance enhancement and server offload while securely delivering content. F5’s solution further enhances web application security with the TrafficShield Application Firewall. Using a positive security model (“deny all unless allowed”), the TrafficShield product provides comprehensive protection for web servers and web applications. By generating an extremely accurate model of all legitimate user interaction with an application, the TrafficShield device is able to filter all application requests and deny anything that is not legitimate user activity, including Buffer Overflow, cross-site scripting, and cookie poisoning. Fast Cache, TCP Express and Intelligent Compression features optimize performance and maximize ROI - Integrating the BIG-IP solution with web servers provides a specialized Layer 4-7 architecture with superior processing power, optimizing application speed and Quality of Service levels. The BIG-IP version 9 Fast Cache enhances performance gains for end users while offloading up to 98% of server connections. Compressing a variety of file types, including HTML, XML, JavaScript, and J2EE applications, Intelligent Compression features provide bandwidth savings for web server deployment, dramatically improving ROI for the enterprise. Utilizing independent client and server side TCP stacks, BIG-IP TCP Express features optimize client side delivery while maintaining server-optimized connections on the inside of the network. This optimization takes place up and down the entire stack, from the transport layer to the protocol and application layers, taking the workload off of the servers for increased server efficiency. The BIG-IP product’s OneConnect feature intelligently manages HTTP sessions to reduce bandwidth cost by up to 20% and increase the capacity of your back-end server farm. F5 solutions enhance end-to-end security at every level of web server deployment - The BIG-IP product comes standard with numerous security features that provide an extremely scalable, highly available and secure solution for both internal and external applications. BIG-IP can be used to balance both inbound and outbound traffic for devices like firewalls, caches, or routers. It enables stringent access control, secure administration, and helps resist common attacks. The FirePass SSL VPN extends this level of secure access to the remote workforce - on any device in any location - without the administrative and cost burden of client side software. The TrafficShield web Application Firewall provides comprehensive, proactive application layer protection that shields back end systems from application level security threats aimed at web server deployments. Centralized SSL acceleration and FIPS improve web server performance and reduce management costs - For encrypted traffic, the BIG-IP solution provides integrated SSL encryption and decryption capabilities. Offloading processor-intensive SSL transactions from the front-end servers greatly improves the performance of the server cluster, freeing it to fill more user requests. This solution maximizes application availability, allows for trouble-free maintenance and reduces administration overhead. By offloading SSL and persistence functions (processor and server intensive operations) customers do not have to buy expensive hardware to support their applications. The result is up to 30% savings on hardware costs, with increased application performance. The BIG-IP product is also the first application traffic management solution with a FIPS (Federal Information Processing Standard) 140-2 Level 2 certified cryptographic/SSL accelerator. F5’s FIPS products meet higher levels of security standards, required by Government agencies, financial services, and healthcare organizations, by integrating a tamper-resistant, key protection module and sophisticated key management capabilities. The management cost savings of centralizing this function on the BIG-IP product, instead of every server, is estimated to be 20 - 25%. Advanced health checking ensures high availability, improves scalability - The BIG-IP product detects a variety of device failures to ensure that mission-critical resources are responding properly. Advanced content and application checks such as Extended Content Verification (ECV) and Extended Application Verification (EAV) simulate an end user request and monitor the true availability of content. With these advanced health checking capabilities, the BIG-IP product can recognize when a resource is unavailable or underperforming and direct traffic to another resource. With the BIG-IP product, all of your applications can achieve mission-critical availability (99.999% uptime),
  • 3. F5 APPLICATION BRIEF 3 WEB SERVERS Benefits - Continued while reducing operational complexity and costs. If one service is nearing capacity, scaling it is as simple as adding another instance of the service to your network and then to the BIG-IP load balancing pool. Thus the BIG-IP product provides a highly scalable solution that allows enterprises to meet growing organizational demands on web and application resources. Universal Inspection Engine, iRules and cookie persistence enhance traffic control - Unlike other networking products on the market, the BIG-IP product can read any value(s) of an IP-based packet header or payload and direct it to the appropriate resource. Based on precise business criteria and requirements, the Universal Inspection Engine (UIE) and iRules™ allow an organization to easily incorporate application specific logic into the BIG-IP product, resulting in significant operational efficiencies. The BIG-IP system’s patented cookie persistence method can insert a cookie on the client, ensuring that users always return to the same web server. Cookie persistence provides consistent results without constant authentication disruptions, thus increasing end user satisfaction.