all 50 ways to use big-ip

Post on 18-Nov-2014

2.865 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

50 Ways to Use BIG-IP

2

Performance

• Caching (WA)• Geolocation (GTM, LTM)• Quality of Service (QoS, Rate shaping)• Data deduplication (WOM)• WAN Optimization (WOM) • Rate limiting (iRules) • Long-distance VMotion (LTM) • DTLS for PCoIP (LTM)

3

Security

• Protocol Security (PSM) • Port lockdown (LTM) • DNSSEC (GTM) • E-mail security (MSM)• Application access control (APM) • IP Blacklisting (ASM) • SQLi Prevention (ASM) • XSS Attack prevention (ASM) • Cookie encryption (LTM) • XML Security (ASM) • Secure remote access (APM, Firepass) • Data leak prevention (ASM, iRules)• FTP Security (ASM)

4

Visibility

• Heatmaps (iRules) • End-point inspection (Firepass, APM) • Traffic inspection (iRules)

5

Optimization

• Compression (WA, WOM) • TCP Offload (LTM) • SSL Offload (LTM) • HTTP Optimization (LTM) • Centralized certificate management (SSL) • Single Sign-On (APM, EGW)

6

Architecture

• Application switching (iRules) • URL rewriting (iRules) • Resource obfuscation (iRules) • URL shortener (iRules) • Application virtualization (LTM) • IPv6 Gateway• PKI CAC Integration (LTM, SSL)• Honeypot redirection (ASM) • Cookie gateway/proxy (LTM, iRules)• Custom error pages (iRules)• XML Routing (iRules)

7

Availability

• Load balancing (LTM) • Failover (LTM) • Global server load balancing (GTM) • Auto-scaling (LTM, iControl) • SIP Load balancing (LTM) • LDAP proxy (iRules) • Link Load balancing (LC)• DDoS protection (LTM)• Sticky sessions (LTM)

8

Load balancers are dead…

LONG LIVE APPLICATION DELIVERY

PSSST! Remember this secret phrase foran extra chance to win a cool prize at Interop Las Vegas:

top related