BIG-IP v11.2 Customer Presentation
BIG-IP v11.2 Customer Presentation
BIG-IP v11.2
Presenter
2
Private
APP APP
OS OS
APP APP APP APP Public
OS OS OS OS
© F5 Networks, Inc.
3
© F5 Networks, Inc.
5
© F5 Networks, Inc.
6
© F5 Networks, Inc.
7
© F5 Networks, Inc.
8
Server /
User Experience Network Demands
© F5 Networks, Inc.
9
Server /
User Experience Network Demands
© F5 Networks, Inc.
10
Business Risks:
Tuning costs will continue to
Losing customers increase with expansion of apps,
Losing revenue devices and browsers
Employee Productivity
User Experience Server / Network Demands
© F5 Networks, Inc.
11
Latency Cloud
Server /
User Experience Network Demands
© F5 Networks, Inc.
13
F5 Optimization Solution
FAST FAST
SECURE SECURE
AVAILABLE AVAILABLE
TMOS TMOS
© F5 Networks, Inc.
14
F5 Optimization Solution
N
CACHING
CONTROL
MAINTAI
SECURE
EDGE
ENTERPRISE CDN
CACHING CONTROL SECURE
FAST FAST
APPLICATION OFFLOAD
APPLICATION OFFLOAD
MOBILE OPTIMIZATION
MOBILE OPTIMIZATION
FRONT-END OPTIMIZATION
FRONT-END OPTIMIZATION
NETWORK OPTIMIZATION
NETWORK OPTIMIZATION
SE RV ER O FF LOA
D
SERVER OFFLOAD
S
TMO
S
TMO
S
iRULES
TMO
ANALYTICS
iAPPS
© F5 Networks, Inc.
15
App Infrastructure
• Problems :
USERS
INTERNET
…
SDPY
HTTP
© F5 Networks, Inc.
17
USERS DATACENTER
INTERNET
…
BIG-IP
© F5 Networks, Inc.
18
QUALITY: 90
SIZE: 102
Image Optimization
• Reduce file size of image by
20-40%
• Reduce quality, remove After All Headers—102 KB
extraneous metadata, convert
format (GIF-> PNG)
QUALITY: 70
• Maintain privacy SIZE: 50
© F5 Networks, Inc.
20
Clients
• Server Latency
• Page Load Time
Instrumentation of App Performance • Response Codes
without adding agents, code or servers • URLs
• Client IPs
• Client Geographic
• User Agent
… and much more
Applications
Custom
Private Public
© F5 Networks, Inc.
23
Server /
User Experience Network Demands
© F5 Networks, Inc.
24
© F5 Networks, Inc.
25
Int • Capture
ell • Analyze
ige • Classify
nc
e
Co
nte
x t
De
liv
• Events ery
• Analysis
• Action © F5 Networks, Inc.
26
Locate IQ Intelligence
Trust IQ Intelligence
IP Intelligence
Subscription
Free
Location
Free
Today Service
Context
xxx IQ Intelligence
Trust IQ Intelligence
IP Intelligence
Subscription
Free
Location
Free
Context
© F5 Networks, Inc.
29
IP Intelligence
Reputation Scanners
Deny access to infected IPs Probes, scans, brute force
IP Intelligence Overview
Service Module IP Intelligence Highlights
• Developed from customer-driven demand
IP Intelligence • Ever-increasing volume of threats
• Dynamic Threat IPs • Improves security stopping known bad traffic Static
and publicly available Black Lists are insufficient
• All BIG-IP appliances
• Near-real-time updates • Compelling value
(up to 5min intervals) • Better appliance efficiency reducing network traffic
• Value-add layer of IP-based security
• Dramatically reduces system • Faster threat response with near-real-time updates
loads
• Provisioned across Multiple Threat Types
• Subscription-based service
• Delivering Dynamic Updates in near real-time
© F5 Networks, Inc.
31
IP Intelligence
How it works
• Fast IP update of malicious activity
• Global sensors capture IP behaviors
• Threat correlation reviews/ blocks/ releases
Internet
Semi-open Proxy Farms
Dynamic Threat IPs
Web Attacks
Exploit Honeypots every 5min.
Reputation
Windows Exploits Naïve User Simulation IP Intelligence
Botnets
Web App Honeypots
Scanners
Network Attacks Third-party Sources
DNS
BIG-IP
System
© F5 Networks, Inc.
32
Packet Parsing • Reduce processing time (e.g., form input • Increase performance and scalability of
Reduction parsing and validation overhead) by blocking protected applications
sites from known Threat IPs
Anonymization • Block inbound connections from anonymous • Increase security and performance of
Prevention proxies device
• Prevent frauds
Phishing Protection • Protect high-value websites by preventing • Increase availability and performance of
access of site objects by phishing sites, or protected servers/applications
by any non end-user source • Prevent frauds
Botnets • Block botnet C&C channels and infected • Improve security and performance
zombie machine controlled by Bot master for • Enhance perimeter security
DoS and other attacks • Mitigate DoS attacks
• Increase device throughput
© F5 Networks, Inc.
33
IP Intelligence
Identify and allow or block IP addresses with malicious activity
Botnet IP Intelligence
Service
IP address feed
updates every 5 min
Attacker Custom
Application
Financial
Application
BIG-IP System
Anonymous
requests
? Geolocation database
© F5 Networks, Inc.
35
© F5 Networks, Inc.
36
Clients
© F5 Networks, Inc.
Video by https://www.dnssec-tools.org/
38
LE DNS
ATION
S
SECURE DN
SCALAB
GEOLOC
FAST FAST
DNS SERVICES
SCALABLE IP GEO DNSSEC
SECURE SECURE
HIGH PERFORMANCE DNS
HIGH PERFORMANCE DNS
AVAILABLE AVAILABLE
DNS DDoS PROTECTION BIG-IP
TMOS TMOS DNS DDoS PROTECTION
AVAILABLE GTM
AVAILABLE
DNS IPV6 to IPv4
DNS IPv6 to IPv4
GLOBAL AVAILABILITY
S
TMO
S
TMO
S
iRULES
TMO
iCONTROL
iAPPS © F5 Networks, Inc.
40
Access Denied:
IPv6 to IPv4
http://f5.com
© F5 Networks, Inc.
41
100ms
15ms
15ms BIG-IP
Global Traffic Manager
Cloud
Private Public
400ms = blink of an eye
Internal Clients
RRSIG record covering is verified by (KSK) DNSKEY record is verified by DS record is signed by
isc.org/DNSKEY for isc.org for isc.org
Data Center
BIG-IP
Global Traffic Manager
Internal Clients
© F5 Networks, Inc.
44
© F5 Networks, Inc.
45
© F5 Networks, Inc.
46
• Configure vulnerability
Data Center
policy in BIG-IP ASM
Attacker
Internet Private
BIG-IP Application
Security Manager Cloud Apps
Virtual Edition
Clients
© F5 Networks, Inc.
48
© F5 Networks, Inc.
© 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePass, iControl, iRules, TMOS,
and VIPRION are registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries