Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bringing Applications Everywhere Gert Jan Wolfis Field Service Engineer.

Similar presentations


Presentation on theme: "Bringing Applications Everywhere Gert Jan Wolfis Field Service Engineer."— Presentation transcript:

1 Bringing Applications Everywhere Gert Jan Wolfis g.wolfis@f5.com Field Service Engineer

2 © F5 Networks, Inc. 2 Users are moving away from the application Distance Data Center Users

3 © F5 Networks, Inc. 3 What is happing? IDC Research 2010 Increase of Mobile and Remote users Service Providers are reconsidering their value adds: Develop Cloud Services Becoming a MVNO IT from the wall Mobile from 3G to LTE

4 © F5 Networks, Inc. 4 Users Opinion No need to be in the office to be efficient More demands for mobile work Ranks high on employee wish-list! I don’t need corporate devices to get the job done

5 © F5 Networks, Inc. 5 Organizational Constraints We have rules here! BYOD variables will increase my budget What will my users access and when? How about Security and Availability of my applications? I want to be in control!

6 © F5 Networks, Inc. 6

7 7 Users Resources PhysicalVirtual Multi-Site DCs PrivatePublic Cloud Availability Scale HA / DR Bursting Load-Balancing Optimization Network Application Storage Offload Security Network Application Data Access Management Integration Visibility Orchestration Application and Data Delivery Network F5’s Dynamic Control Plane Architecture

8 © F5 Networks, Inc. 8 TMOS Architecture The foundation of BIG-IP LTM and a unified system for application delivery

9 © F5 Networks, Inc. 9 More Router BIG-IP LTM Application Servers BIG-IP Local Traffic Manager Direct traffic to the best available server Guarantee application availability Fast Compression RAM Caching TCP Multiplexing Fast Compression RAM Caching TCP Multiplexing Available Load balancing Health Monitor Server Persistence Available Load balancing Health Monitor Server Persistence Secure DDoS protection TCP proxy Application proxy SSL offload Secure DDoS protection TCP proxy Application proxy SSL offload

10 © F5 Networks, Inc. 10 Benefits of LTM Increase Application Availability Accelerate Applications Increase Application Server Capacity Optimize Bandwidth Usage Secure Applications and Data Take Control of Application Delivery “ [BIG-IP] definitely helped us get to profitability faster. Tom Putnam Operations Manager, MSN Games Application Delivery Network

11 © F5 Networks, Inc. 11 BIG-IP Global Traffic Manager provides dynamic data center load balancing, ensuring users are sent to the best available location, and the closest location to provide the fastest experience. BIG-IP Global Traffic Manager is an integral part of any DNS core infrastructure by providing scale, security, and simplification. BIG-IP Global Traffic Manager Direct traffic to the best available data center More Router L-DNS BIG-IP GTM BIG-IP LTM App Servers Data Center 1 Client Router BIG-IP LTM Data Center 2 BIG-IP GTM App Servers

12 © F5 Networks, Inc. 12 Benefits of GTM Global availability for mobile and remote users Scalable GSLB Performance (125k – 6M QPS) Protects against DNS Attacks Delivers best possible user-experience based on availability

13 © F5 Networks, Inc. 13 Who is the user? What devices are requesting access? When are they allowed to access? Where are they coming from? How did they navigate to the page/site? Context leverages information about the end user to improve the interaction Who What When Where How

14 © F5 Networks, Inc. 14 One Access Solution – BIG-IP APM All Access Use Cases BIG-IP Access Policy Manager Web Access Management: Proxy to HTTP apps –Custom –3 rd party Remote Access: SSL VPN –Network Access –Portal Access –App Tunnels Application Access Control: Proxy to Non-HTTP apps –Citrix ICA –ActiveSync –Outlook Anywhere

15 © F5 Networks, Inc. 15 Users BIG-IP LTM + APM Data Center Directories Enable Simplified Application Access with BIG-IP Access Policy Manager (APM)

16 © F5 Networks, Inc. 16 Reduce Costs Through Consolidation Guarantee application availability with health monitoring and load balancing Manage both local and remote user access Consolidate AAA management for multiple applications Scale to tens of thousands of users

17 © F5 Networks, Inc. 17 BIG-IP Access Policy Manager (APM) Unified Access and Control for BIG-IP BIG-IP ® APM ROI Benefits: Consolidates auth. infrastructure Reduces AAA management costs Simplifies remote, web and application access control *AAA = Authentication, Authorization and Accounting (or Auditing) BIG-IP ® APM Features: Centralizes single sign on and access control services Full proxy L4 – L7 access control at BIG-IP speeds Adds endpoint inspection to the access policy Visual Policy Editor (VPE) provides policy based access control VPE Rules – programmatic interface for custom access policies Personalize by customization of web pages and Edge client appearance Full proxy access control at BIG-IP scale and speed iPad, Droid, tablet & smartphone support

18 © F5 Networks, Inc. 18 Access Policy Manager Application Authentication Radius LDAP Active Directory SecurID HTTP FORM OAM OCSP CRLDP TACACS+ Kerberos BIG-IP APM Clients Windows Mac Linux IOS Android WM Client Authentication Form Based Certificate Kerberos Token Single Sign On (SSO) HTTP Basic Form Based NTLM v1 NTLM v2 Kerberos Application Web Access Web portal (webtop) SSL VPN Portal Access (web proxy) Application Tunnel (tcp proxy) VDI MS RDP VMware Citrix RDP Citrix Web Interface Authorization Radius LDAP Active Directory Information collected Pre logon information Pre Logon Antivirus Firewall File info Registry info Process info Window info Client type

19 © F5 Networks, Inc. 19 Dynamic Webtop for End-User Customizable and localizable list of resources Adjusts to mobile devices Toolbar, help, and disconnect buttons

20 © F5 Networks, Inc. 20 Auto-Connect! At Home (wireless) On the Way to Work (Aircard) In the Office (docked LAN connection) Presenting (corporate wireless) Always Connected Application Access In the Cafe (wireless) Auto-Connect to the VPN

21 © F5 Networks, Inc. 21 Control Access of Endpoints Ensure strong endpoint security Antivirus software version and updates Software firewall status Access to specific applications Restrict USB access Cache cleaner leaves no trace Ensure no malware enters corporate network Allow, deny, or remediate users based on endpoint attributes such as: Invoke protected workspace for unmanaged devices: BIG-IP APM

22 © F5 Networks, Inc. 22 Provide access based on device and identity Make dynamic policy decisions Authenticate users Provide remediation for non-compliant devices Mobile Clients for Fast App. Access

23 © F5 Networks, Inc. 23 Next Generation Protocol: SPDY For more information about SPDY, visit www.chromium.org/spdy/spdy-whitepaperFor more information about SPDY, visit www.chromium.org/spdy/spdy-whitepaper. HTTP SPDY SSL TCP Application Transport SPDY is new application layer protocol developed by Google Overcomes inherent inefficiencies with HTTP Improved performance (~ 20-50%). Good for limited bandwidth mobile networks. Chrome, Firefox, Amazon Silk browser support (50% market share) and Android 3.0+ devices Chrome Firefox v11+ Amazon Silk Android 3.0+

24 © F5 Networks, Inc. 24 The trust level of a mobile device is dynamic Identify and assess the risk of personal devices Assess the value of apps and data Define remediation options Notifications Access control Quarantine Selective wipe Set a tiered policy BYOD Trust Model

25 © F5 Networks, Inc. 25 Requirements Has MDM Entitlements from and Supports iOS, Android and Windows Mobile Devices Able to or has roadmap to provision F5 Edge Client on iOS Able to or has roadmap to provision OTP and Certificates Supports Phone Home and Remote Wipe Supports F5 APM as MSFT ActiveSynch Proxy Combining the Power of and MDM

26 © F5 Networks, Inc. 26 Mobile Users BIG-IP Local Traffic Manager Access Policy Manager App 1 App n MDM System HA Configuration Offload SSL, Caching, Compression, IPV6… Auth Proxy Offload Load Balancing, SSL Offload, High Speed Auth Proxy and SSO APM Queries MDM and/or Directories LTM Services Combining the Power of and MDM Wireless App 2 Acceleration Un-managed devices get limited access ACLs Managed devices get full access

27 © F5 Networks, Inc. 27 Benefits of F5 & MDM F5 checks device posture and compliance with MDM F5 does periodic compliance checks Corporate information and VPN settings can be wiped IT can trust and control all devices accessing VPN/WiFi

28 © F5 Networks, Inc. 28 F5 Unified Access and Control Flexible and Dynamic ADC Services – BIG-IP Internet BIG-IP System Virtual Editions Data Center BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager +Access Policy Manager Mobile and Remote Users Public/Private Cloud Optimized Applications to BIG-IP Edge Client App 1 App n Directory MDM

29 © F5 Networks, Inc. 29 Next Steps: BE IN CONTROL! Create your own BYOD trustmodel Rethink your application security and availability Understand your users context Centralize policy management Leverage F5 solutions!

30 © 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePass, iControl, iRules, TMOS, and VIPRION are registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries


Download ppt "Bringing Applications Everywhere Gert Jan Wolfis Field Service Engineer."

Similar presentations


Ads by Google