F5 IT Agility. Your Way. - Na.eventscloud

Transcription

F5 – IT Agility. Your Way.Guaranteed Application Fluency with F5Presented by: Brendon ThwaitesMidmarket & Alliances Manager – Australia & New Zealandb.thwaites@f5.com0412663858

2AGENDA Evolution of the InternetDrivers for IT AgilityComponents of Application DeliveryChallenges around Application DeliveryStrategic Control PointsSummary

3Cloud Computing – Is it market hype?http://www.newsweek.com/id/106554

4Cloud Computing – Is it market hype?http://www.newsweek.com/id/106554

5Time warp 1996 Today The Internet had 20 million users in 1996 (most connecting via 14.4k or28.8k dialup). Today in India alone there are 150 million households thatare connected. In 1996 the average user spent 30min / month online (today this is morelike 27hrs / month). The average household today creates more Internet traffic than theentire Internet back in 1996. Today most people have a Terabyte of content in their homes (I-pod,backup HDD, digital photos, thumb drives etc). In 1996 we had a 40MBHDD and moved things around using a 1.44MB floppy disks. Evolution of online productivity (e.g. e-Commerce, You-tube, SocialNetworking, real-time applications etc)

6What’s my point? Initially the Internet was uncomplicatedOver time our usage of the Internet has evolvedInnovations are facilitating new online services/applicationsUsers and consumers have expectations that they cancomplete tasks and transactions online Static infrastructures don’t accommodate change very well Customers are less responsive to demands Rapidly accelerating complexityRight now there is a large shift towardsIT Agility for online applications

7Global Leader in Application Delivery Layer 7-4 Load Balancing Traffic Management / Full Proxy Web Application Acceleration Web Application Firewall Server Offload (e.g. SSL, cache etc)

8 10,000 customers globally

9Components of Application tyApplicationPerformanceApplicationSecurity

10STORAGESERVERSAPPLICATIONSWEB & PORTALGATEWAYWIDE AREATELCOEND POINTChallenges in Application DeliveryEnterprise application traffic flows both ways betweenevery tier of the datacenterThese tiers are often designed/implemented individually– Interoperability challenges– Performance issues are hard to pinpoint– Distributed architecture decisions

11Business Initiatives – Today’s climateEnd userexperienceUnifiedComputingCompliance& RSAPPLICATIONSWEB & IDE AREATELCOEND POINTEnd pointSecurity

12How does this look inside your team?Slow responsesBloated dataSecurity risksMany serversData growthOracle, SAP, SharePointApplication AttacksXML, SOAP, ActiveX, JS*@#!Remote ctSecurityArchitect*@#!StorageArchitect

14F5 & Dell – 6 Strategic points of controlEnd PointGatewayWeb TierAccessPolicyMgr WAN Optimization Module ApplicationSecurity MgrWeb AcceleratorApp TierStorageTier

15Control Point #1 - Datacenter yData CenterBranch EmployeesLAN & wLANCustomer, Partners, orSuppliersDRData CenterDev/Test/Pre-Prod

16Control Point #1 - Datacenter yData CenterBranch EmployeesLAN & wLANCustomer, Partners, orSuppliersDRData CenterDev/Test/Pre-Prod

17How to make it betterVirtual Data CentreData Center1Data Center2

18Virtual Data CentreData Center1Data CenternData Center2

19MobileEmployeesRemoteEmployeesBranch EmployeesLAN & wLANCustomer, Partners, orSuppliersVirtual Data CentreProductionData Center1Pre-ProductionData Center2TestDevelopmentDevelopmentData Centern

20Control Point #2 – Web & App Tier VirtualizationApplication Layers 4-7F5 Local Traffic ManagerIdentity & AccessManagement (IAM)Application & RemoteAccessApplicationAccelerationApplication Security /PCI DSSNetwork Layers 1-3ROUTERSCloud ComputingVirtualizationApplication SwitchingSWITCHES FIREWALLSIntelligent ClientsHigh Availability / BCP/ esiControlNetwork AccelerationDell Power ConnectData CenterApplications

21Control Point #3 – File Virtualization Virtualized Global Namespace for unstructured data– Storage vendor interoperability (CIFS & NFS)– Live transparent migrations(e.g. during business hrs)– Automatic tiering policies– Reduce Backup ile-based ExabytesBlock-based Exabytes

22Control Point #4 - Web Application Security Network Firewalls protect the Network Applications are prone to targeted Layer-7 attacks Attacks look like trusted traffic at Layers 3/4Positive Security(L3-4 Network Firewall)Positive Security(L7 Application Firewall)IntrenetIntranet / ExtranetWeb trafficLegitimate Web TrafficMalicious Application ActivityApplication FloodsWeb ServersNetwork Attacks & FloodsUnsupported ServicesOther trafficApplication ServersDatabases

23Control Point #5 – Web Application Performance1. Fix application performance issuesby upgrading network2. Throw more bandwidth at it - theproblem still exists?3. Add more CPU and Memory1204. Add more servers5. Add Quality of Service6. Symmetric Acceleration - applianceson both ends of pipeWhy are web apps are still slow? What about remote users?7. Restrict the functionality of theapplication8. Remove rich contentIntelligent BrowserReferencingEEPrevious Attempts

24Control Point #5 – Web Application PerformanceInternetCACHEFirst Page load:150 objects x 100ms latency D/L time2 objects at a time 75 roundtrips download 7.5s 10s 17.5s

25Control Point #5 – Web Application PerformanceStill Valid ?Yes it’s validInternetCACHESecond Page load:150 objects x 100ms latency Zero D/L2 objects at a time 75 roundtrips to validate content 7.5s 0s 7.5s

26Control Point #5 – Web Application Performance98% still validInternetCACHECACHESecond Page Load using WA: One roundtrip for new JPG D/L 0.1s 1s 1.1s Less roundtrips Mitigates the effects of latency Makes Web Applications usable

27Control Point #6 – Virtual InfrastructureView Manager load grows over timeImprove efficiency by offloading SSLSession ID persistence (vs. Source IP)Load balancing for View Manager serversAccelerates RDP 12:1Supportsa Native PCoIP over DTLS

28Control Point #6 – Virtual InfrastructureElastic Applications /Automatic ProvisioningDemand DetectionAutomationVM ProvisionF5 ProvisionDemand DetectionAutomationF5 DeprovisionVM DeprovisionvCenter AppSpeedMonitoring & ManagementWeb ClientsiControlFrontends VirtualizationBIG-IP LTMFrontEndiControlWeb ClientsFrontEndFrontEndAppServers VirtualizationBIG-IP LTMApp. ServerApp. ServerStorage VirtualizationApp. Server

29Control Point #6 – Virtual InfrastructureLong DistanceV-MotionAccelerated iSCSIReplicationBIG-IP GlobalTraffic Manager4 GTM SwitchGTM reroutes any new app connections/sessionsdirectly to Site B. Existing sessions are routedindirectly through Site A to Site B until they complete.1BIG-IP LocalTraffic ManageriSession secure, accelerated tunnelBIG-IP LocalTraffic ManagerLink Site A to Site B via BIG-IP iSession tunnelvCenter A5Transfer VM from vCenter A to BUse API calls to associate VM with vCenter in Site B.During this transfer, GTM & LTM maintain connectivity toVM. Since all new connections are routed directly to SiteB, and the old connections gradually bleed off, eventuallyall connections are made directly into Site B. Processcomplete.3VMotion VM from cloud 1 to cloud 2, using the sameiSession tunnel. vCenter A still in control.2Storage Vmotion over iSessionUse Storage VMotion to move VM’s datastore fromSite A to Site B. vCenter A still in control.vCenter B

30F5 & Dell – Solution Summary Datacenter Virtualization & HAWeb & App tier Virtualization & HAFile Virtualization & ManagementWeb Application SecurityWeb Application PerformanceVirtual Infrastructure

31

Traffic Management Operating System(TMOS)BIG-IP/VIPRION HardwareFile Virtualization (ARX)iControliRulesWAN Optimization Module(WOM)WebAccelerator(WA)Access Policy Manager(APM)Application SecurityManager (ASM)Protocol Security Manager(PSM)Global Traffic Manager(GTM)Local Traffic manager(LTM)32Solution ArchitectureEdge Gateway (EGW)

33F5’s top 10 for IT Agility1. Risk Mitigation2. Cost Control3. Best Practices (Reference Architecture for SAP, MS, Oracle)4. Adaptability & Scalability5. App fluency (i.e. over the network)6. High Availability (Web, App, Datacenter)7. Performance (Application / Network / Server / Client)8. Web Application Security (e.g. PCI Compliance)9. Access Control (Physical or Virtual Desktops)10. 7 Tiers of VirtualizationThe flexibility to add capabilities as you grow

F5 - IT Agility. Your Way. . BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager Link Site A to Site B via BIG-IP iSession tunnel 2 3 vCenter A 5 Transfer VM from vCenter A to B vCenter B 1 iSession secure, accelerated tunnel 4 GTM Switch Long Distance V-Motion Accelerated iSCSI Replication