0% found this document useful (0 votes)
100 views50 pages

BIG-IP v11.2 Customer Presentation

F5's vision is to separate, consolidate, aggregate, and automate application services across private and public clouds. The presentation discusses F5's new BIG-IP v11.2, which provides an extensible platform for application delivery from enterprise to cloud. It introduces new features for acceleration, security, and traffic management to optimize application performance and the user experience.

Uploaded by

superthang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views50 pages

BIG-IP v11.2 Customer Presentation

F5's vision is to separate, consolidate, aggregate, and automate application services across private and public clouds. The presentation discusses F5's new BIG-IP v11.2, which provides an extensible platform for application delivery from enterprise to cloud. It introduces new features for acceleration, security, and traffic management to optimize application performance and the user experience.

Uploaded by

superthang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 50

Dynamic Data Center Revolution

BIG-IP v11.2

Presenter
2

F5’s Vision: Dynamic Application Services

Separate Consolidate Aggregate Automate Liberate


Test and Server Capacity Self-Managing Enterprise
Development Consolidation On Demand Datacenters Computing Clouds
On and Off Premise

Private
APP APP
OS OS
APP APP APP APP Public
OS OS OS OS

APP APP APP APP


APP APP APP APP OS OS OS OS
OS OS OS OS
APP APP APP APP
OS OS OS OS

A Reusable and Extensible IT Services Platform from Enterprise to Cloud

© F5 Networks, Inc.
3

Strategic Points of Control – A Smarter Approach


The Application Delivery Network

Acceleration: Application Delivery Optimization


Introduce 1st integrated SPDY Gateway and new Front End Optimizations to solve the
mobile performance challenges

Security: Global Delivery Intelligence


Introduce new subscription service ecosystem that consolidates all the intelligence
available in the cloud at the ADC to make better decisions

Traffic Management: Dynamic DNS Infrastructure


Best in class DNS infrastructure solutions that allows organization to reduce costs, keep
their applications up, and improve the performance and security of their critical DNS
infrastructure.
© F5 Networks, Inc.
4

The Shift To The Intelligent Network

We want to leverage the We need to approach Users expect a better


business data security different experience

Business Analytics Personalized


Evolving Threats Experience

© F5 Networks, Inc.
5

Context leverages information about the


end user to improve the interaction

Who • Who is the user?

What • What devices are requesting access?

Where • When are they allowed to access?

When • Where are they coming from?

How • How did they navigate to the page/site?

© F5 Networks, Inc.
6

Application Delivery Optimization

© F5 Networks, Inc.
7

Impact of Slow Performance

500 millisecond delay caused


20% traffic decrease.

100 millisecond delay


caused 1% drop in revenue.

400 millisecond delay caused a


5-9% decrease in traffic.

© F5 Networks, Inc.
8

Application Delivery / The Evolution


End User Network / App Owner

Many apps via various browsers


delivered to countless devices each
running a different O/S

FRONT END DELIVERY GENERATION

Server /
User Experience Network Demands
© F5 Networks, Inc.
9

Application Delivery / The Evolution


End User Network / App Owner

FRONT END DELIVERY GENERATION

Server /
User Experience Network Demands
© F5 Networks, Inc.
10

Application Delivery / Today


End User Network / App Owner

Company’s are spending


upwards of $100,000 per
application just to
“tune” delivery

FRONT END DELIVERY GENERATION

Business Risks:
Tuning costs will continue to
 Losing customers increase with expansion of apps,
 Losing revenue devices and browsers
 Employee Productivity
User Experience Server / Network Demands
© F5 Networks, Inc.
11

ADO is an End-to-End Problem


End User Network / App Owner

Protocols efficiency Video


BYOD SaaS
Mobile Networks
App Bloat
App Chattiness
Bandwidth
Server Capacity
Browser Choice Virtualization

Latency Cloud

FRONT END DELIVERY GENERATION

Customers expect the business IT departments have the 1000s


to be as good as their of apps and lack the visibility
consumer experience and control
User Experience Server / Network Demands
© F5 Networks, Inc.
12

Application Delivery Optimization / Rethinking Fast

End User Network / App Owner

With F5 you can optimize your


end user experience without
driving up IT infrastructure costs.

FRONT END DELIVERY GENERATION

Server /
User Experience Network Demands
© F5 Networks, Inc.
13

F5 Optimization Solution

FAST FAST

SECURE SECURE

AVAILABLE AVAILABLE

TMOS TMOS

© F5 Networks, Inc.
14

F5 Optimization Solution

N
CACHING

CONTROL
MAINTAI

SECURE
EDGE
ENTERPRISE CDN
CACHING CONTROL SECURE

FAST FAST
APPLICATION OFFLOAD
APPLICATION OFFLOAD

MOBILE OPTIMIZATION
MOBILE OPTIMIZATION

FRONT-END OPTIMIZATION
FRONT-END OPTIMIZATION

NETWORK OPTIMIZATION
NETWORK OPTIMIZATION
SE RV ER O FF LOA
D

SERVER OFFLOAD

S
TMO

S
TMO

S
iRULES

TMO
ANALYTICS
iAPPS

© F5 Networks, Inc.
15

Next Generation Protocol: SPDY

• SPDY is new application layer


protocol developed by Google Application HTTP
• Overcomes inherent inefficiencies
with HTTP SPDY
• Improved performance
(~ 20-50%). Good for limited SSL
bandwidth mobile networks.
• Chrome, Firefox, Amazon Silk
browser support (50% market
Transport TCP
share) and Android 3.0+ devices

For more information about SPDY, visit www.chromium.org/spdy/spdy-whitepaper.

Amazon Silk Android 3.0+ Chrome Firefox v11+


© F5 Networks, Inc.
16

App Infrastructure
• Problems :

• Web apps on apache infrastructure would need to be updated to take


advantage of SPDY

• Non apache based apps can’t be accelerated (Oracle, MS, IBM…)

USERS

INTERNET


SDPY
HTTP

© F5 Networks, Inc.
17

Future-proof Your Web Applications


• Solution: Legacy web apps get benefits of SPDY

 Reduce complexity and cost of upgrading


 Support new devices without re-architecture
 Scale existing legacy app infrastructure

USERS DATACENTER

INTERNET


BIG-IP

SDPY SPDY GATEWAY


HTTP

© F5 Networks, Inc.
18

Mobile and Remote Acceleration


Before All Headers—135 KB

QUALITY: 90
SIZE: 102

Location Label Camera Date Exposure Program


Copyright Firmware Digitized Date Thumbnail
ISO Flash Compensation Modified Date JPEG Quality
Shutter Speed Image Number File Date Tags
Exposure Bias Lens Flash Unique ID
Max Aperture Lens ID Focal Length X Resolution
Focal Plane X Resolution Serial Number Focal Length in 35mm film Y Resolution
SOURCE: HTTP Archive (http://www.httparchive.org) Focal Plane Y Resolution Software CCD Width Flash Function Not Present
Focal Plane Resolution Unit Files size Aperture Flash Mode
Custom Rendered Dimensions F Number Supports Red-Eye Reduction
Exposure Mode Camera make White balance Flash Return
Scene Capture Type Camera model Metering Mode

Image Optimization
• Reduce file size of image by
20-40%
• Reduce quality, remove After All Headers—102 KB
extraneous metadata, convert
format (GIF-> PNG)
QUALITY: 70
• Maintain privacy SIZE: 50

Location File Date


File Size JPEG Quality
Dimensions Unique ID © F5 Networks, Inc.
19

F5 Streamlines Image Intensive


Websites
On average 40%

Original image Size Average image size Image Opt


Site (Homepage) (total image bytes) (total image bytes) Reduction %

788647 16780 30.47%

58919 3682 46.77%

299486 6511 43.53%

494832 10081 49.96%

1959236 14731 24.24%

© F5 Networks, Inc.
20

Mobile and Remote Acceleration

original re-ordered original re-ordered

original re-ordered original re-ordered

Front-End Optimization: Content Re-Ordering faster (improve start to display time)


• Actual overall page load time doesn’t not change
• Move CSS style sheets to the top of the HTML
• Move JavaScript to the bottom of the HTML
© F5 Networks, Inc.
21

Real-Time End-User Performance SLAs


From Enterprise to Cloud

Clients

• Server Latency
• Page Load Time
Instrumentation of App Performance • Response Codes
without adding agents, code or servers • URLs
• Client IPs
• Client Geographic
• User Agent
… and much more

Applications
Custom
Private Public

DATACENTER CLOUD © F5 Networks, Inc.


22

Global Application Performance Visibility


Centralized Analytics and Reporting

© F5 Networks, Inc.
23

F5: Application Management, Scale, Optimization


App Delivery Optimization lowers costs and delivers faster applications

App and Mobile and Application


Infrastructure Offload Remote Acceleration Performance Monitoring

F5 delivers first F5 provides advanced F5 streamlines


integrated SPDY optimization capabilities application performance
Gateway for emerging for BIG-IP, the worlds monitoring across
web protocol, enabling leading ADC, reducing the multiple datacenters
faster apps and size of web images by up without agents, code or
offloading costly to 50% servers
infrastructure

Server /
User Experience Network Demands
© F5 Networks, Inc.
24

New Subscription Services


Global Delivery Intelligence

© F5 Networks, Inc.
25

What’s Required To Build Context

Int • Capture
ell • Analyze
ige • Classify
nc
e
Co
nte
x t
De
liv
• Events ery
• Analysis
• Action © F5 Networks, Inc.
26
Locate IQ Intelligence

Trust IQ Intelligence

IP Intelligence
Subscription

Free
Location
Free

Today Service

Context

Fast Available Secure


Global Delivery Intelligence

An ecosystem of cloud-based services to make better network decisions.


© F5 Networks, Inc.
27
Locate IQ Intelligence Site IQ Intelligence

xxx IQ Intelligence
Trust IQ Intelligence

IP Intelligence
Subscription

Free
Location
Free

Today Service Roadmap

Context

Fast Available Secure


Global Delivery Intelligence

An ecosystem of cloud-based services to make better network decisions. © F5 Networks, Inc.


28

IP Intelligence: Defend Against Malicious


Activity and Web Attacks
Enhance automated application delivery
We need to approach
decisions adding better intelligence and stronger
security different
security based on context.

Layer of IP threat protection delivers context to


identify and block IP threats using a dynamic data
set of high-risk IP addresses.

Visibility into threats from multiple sources


leverages a global threat sensor network

Deliver intelligence in a simple way reveals


inbound and outbound communication

Evolving Threats Real-time updates keep protection at peak


performance refreshing database every five
minutes.

© F5 Networks, Inc.
29

IP Intelligence

Reputation Scanners
Deny access to infected IPs Probes, scans, brute force

Windows Exploits Denial of Service


Known distributed IPs DoS, DDoS, Syn flood

Web Attacks Phishing Proxies


IPs used for SQL Injection, CSRF Phishing sites host

BotNets Anonymous Proxies


Infected IPs controlled by Bots Anon services, Tor
© F5 Networks, Inc.
30

IP Intelligence Overview
Service Module IP Intelligence Highlights
• Developed from customer-driven demand
IP Intelligence • Ever-increasing volume of threats
• Dynamic Threat IPs • Improves security stopping known bad traffic Static
and publicly available Black Lists are insufficient
• All BIG-IP appliances
• Near-real-time updates • Compelling value
(up to 5min intervals) • Better appliance efficiency reducing network traffic
• Value-add layer of IP-based security
• Dramatically reduces system • Faster threat response with near-real-time updates
loads
• Provisioned across Multiple Threat Types
• Subscription-based service
• Delivering Dynamic Updates in near real-time

© F5 Networks, Inc.
31

IP Intelligence
How it works
• Fast IP update of malicious activity
• Global sensors capture IP behaviors
• Threat correlation reviews/ blocks/ releases

Key Threats Sensor Techniques IP Intelligence Service:


Threat Correlation

Internet
Semi-open Proxy Farms
Dynamic Threat IPs
Web Attacks
Exploit Honeypots every 5min.
Reputation
Windows Exploits Naïve User Simulation IP Intelligence
Botnets
Web App Honeypots
Scanners
Network Attacks Third-party Sources
DNS
BIG-IP
System
© F5 Networks, Inc.
32

IP Intelligence Use Cases for BIG-IP


Use Cases Threat Prevention Scenarios Benefits
Malicious Inbound • Rejecting inbound connection attempts from • Improve security and performance
Connection Attempts known Threat IPs • Enhance perimeter security
• Automatically update real-time feeds • Mitigate DoS attacks
• Increase device throughput

Malicious Outbound • Block outbound communications from • Reduce security risk


Communications infected endpoints (i.e., zombies) to botnet • Prevent frauds
networks • Prevent information leakage

Packet Parsing • Reduce processing time (e.g., form input • Increase performance and scalability of
Reduction parsing and validation overhead) by blocking protected applications
sites from known Threat IPs

Anonymization • Block inbound connections from anonymous • Increase security and performance of
Prevention proxies device
• Prevent frauds

Phishing Protection • Protect high-value websites by preventing • Increase availability and performance of
access of site objects by phishing sites, or protected servers/applications
by any non end-user source • Prevent frauds

Botnets • Block botnet C&C channels and infected • Improve security and performance
zombie machine controlled by Bot master for • Enhance perimeter security
DoS and other attacks • Mitigate DoS attacks
• Increase device throughput

© F5 Networks, Inc.
33

IP Intelligence
Identify and allow or block IP addresses with malicious activity
Botnet IP Intelligence
Service

IP address feed
updates every 5 min
Attacker Custom
Application

Financial
Application
BIG-IP System
Anonymous
requests

? Geolocation database

Anonymous Internally infected


Proxies devices and servers
Scanners
• Use IP intelligence to defend attacks
• Reduce operation and capital expenses © F5 Networks, Inc.
34

Dynamic DNS Infrastructure

© F5 Networks, Inc.
35

Dynamic DNS Infrastructure

• Improve web performance and browsing

• Protect your site and reputation

• Direct customers to right data center and clouds

• Reduce data center costs

© F5 Networks, Inc.
36

Driving Demand for DNS/HTTP

Increase DNS/HTTP due to query growth

Clients

• Last 5 years, volume of DNS queries 2x+* (.com/.net)


• Average daily query load of 57 billion in the first quarter of 2011*
• Future growth is expected to occur at an even faster pace*
© F5 Networks, Inc.
37

Larger, More Complex Web = More DNS/HTTP


• Fundamental change in the way apps. are used
• Site requests spawn subsequent DNS requests slowing page loads
• Every image, add button, widget, link, etc. has a potential IP address lookup

© F5 Networks, Inc.
Video by https://www.dnssec-tools.org/
38

Distributing Requests Across Clouds


Cloud-balancing with DNS and GSLB Services

Simple and Robust Cloud DNS Management:


• Ensure DNS queries routed efficiently to best DC or cloud
• Extend query management and caching to cloud deployments
• Increase productivity with fast app. responses
© F5 Networks, Inc.
Complete DNS and HTTP
39

Services and Protection


BIG-IP Global Traffic Manager
DNSSEC

LE DNS

ATION

S
SECURE DN
SCALAB

GEOLOC
FAST FAST
DNS SERVICES
SCALABLE IP GEO DNSSEC
SECURE SECURE
HIGH PERFORMANCE DNS
HIGH PERFORMANCE DNS
AVAILABLE AVAILABLE
DNS DDoS PROTECTION BIG-IP
TMOS TMOS DNS DDoS PROTECTION
AVAILABLE GTM
AVAILABLE
DNS IPV6 to IPv4
DNS IPv6 to IPv4

COMPLETE DNS CONTROL


COMPLETE DNS CONTROL
GLOBAL AVAILABI
LITY

GLOBAL AVAILABILITY
S
TMO

S
TMO

S
iRULES

TMO
iCONTROL
iAPPS © F5 Networks, Inc.
40

The Value of Complete DNS / Web Solution

Scalable 10x; 70% Denial of Service Mitigation

Support client requests


Complete DNS control and consolidates IT

Access Denied:
IPv6 to IPv4

Route based on geolocation Secure DNS Query Responses

http://f5.com
© F5 Networks, Inc.
41

Dynamic Site Response and App. Delivery


DNS Caching and Resolving in BIG-IP GTM.
Data Center

DNS response time:


300ms = Mobile
100ms = PCs

100ms
15ms
15ms BIG-IP
Global Traffic Manager

Cloud
Private Public
400ms = blink of an eye

Internal Clients

• Faster Web browsing from reduced DNS latency


─ 80% reduction in DNS latency delivering faster web
• Reduced DNS infrastructure costs
─ 80% reduction of outbound DNS queries © F5 Networks, Inc.
42

Slow Response on DNSSEC validation


• Validating secure site responses require lots of steps
that slows response times
• For example:
15 steps!! http://isc.org

A record for is signed by RRSIG record covering is verified by (ZSK) DNSKEY


is signed by
www.isc.org www.isc.org/A record for isc.org

RRSIG record covering is verified by (KSK) DNSKEY record is verified by DS record is signed by
isc.org/DNSKEY for isc.org for isc.org

RRSIG record is verified by (ZSK) DNSKEY is signed by


RRSIG record is verified by
covering isc.org/DS record for org covering org/DNSKEY

(KSK) DNSKEY DS record RRSIG record


is verified by is signed by is verified by
record for org for org covering org/DS

(ZSK) DNSKEY RRSIG record (KSK) DNSKEY


is signed by is verified by
record for . covering ./DNSKEY record for .
© F5 Networks, Inc.
Example provided by infoblox.com
43

Complete DNS Security


High performance DNSSEC validations

• Rapid validation of DNSSEC responses


• Offload DNSSEC computations
• Consolidate DNS Infrastructure http://f5.com

Data Center

BIG-IP
Global Traffic Manager

Internal Clients

© F5 Networks, Inc.
44

Dynamic DNS Infrastructure for Rapid Growth


with BIG-IP Global Traffic Manager (GTM)

•Robust, Flexible and Secure DNS Infrastructure


•Easily mitigate DNS DDoS Attacks
•Support hybrid IP Environments
•Complete DNS Security
•Scale and manage DNS and apps globally

© F5 Networks, Inc.
45

Fast Vuln. Assessment and App. Security

© F5 Networks, Inc.
46

Unknown Vulnerabilities in Web Apps

• Unable to find or mitigate


vulnerabilities
• Very expensive to fix
by recoding
• Difficult to include scanner
assessments
• Need assurance that app sec.
is deployed properly Web
Application
Vulnerabilities
as a percentage
of all disclosures
in 2011 H1
Web Applications:
37 percent
Others:
63 percent Source: 1BM X-Force Research and Development
© F5 Networks, Inc.
47

Free App Scan Service to Mitigate Vulnerabilities

• Free application vulnerability scan:


• Cenzic Cloud in ASM UI
• 3 free scans

• Configure vulnerability
Data Center
policy in BIG-IP ASM

• Protection from web app attacks


BIG-IP Application
Security Manager

Web 2.0 Apps

Attacker

Internet Private
BIG-IP Application
Security Manager Cloud Apps
Virtual Edition
Clients

© F5 Networks, Inc.
48

Free Cenzic Cloud Scans with ASM


Find Vulnerabilities and Reduce Exposure

• 3 free application scans directly from ASM/VE UI


• Free scans are limited health check services
• No time limits once signed up
• No other vendors provide free scan in UI

Cenzic Cloud scans test for:

1. Cross-Site Scripting 6. Credit Card Disclosure


2. Application Exception 7. Non-SSL Password
3. SQL Injection 8. Check HTTP Methods
4. Open Redirect 9. Basic Auth over HTTP
5. Password Auto-Complete 10. Directory Browsing
© F5 Networks, Inc.
49

Benefits of Cenzic Cloud and BIG-IP ASM

• Narrows window of exposure and reduces operational costs:


– Real-time assessments and virtual patching
– Operationalizes admin. and simplifies mitigation
• Assures app security, availability and compliance:
– Assurance no matter vulnerabilities or policies built
– OWASP protection, compliance, geo blocking
• Improves app performance:
– Availability improves cost effectiveness
• Deploys flexibly with increased agility:
– Deployment in virtual and cloud environments
• Easily integrates with SDLC practices:
– Ongoing website security program

© F5 Networks, Inc.
© 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePass, iControl, iRules, TMOS,
and VIPRION are registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy