BlueCoat_Roger_Gotthardsson

Download Report

Transcript BlueCoat_Roger_Gotthardsson

Blue Coat Systems
Roger Gotthardsson
Sr. Systems Engineer
[email protected]
Agenda

Company
 Corporate data

Solutions
 Client Proxy Solution
 Blue Coat Webfilter
 SSL Proxy
 Reverse Proxy
 MACH5

Products
 ProxySG, ProxyAV, Director, Reporter
 K9, - Blue Coat Webfilter at home for free
Company
About Blue Coat
• Innovative leader in secure content & application delivery
– 500+ employees; $146M annual revenue run rate
– 25,000+ appliances shipped worldwide to more than 4,000 customers
– #1 (37%) market leader in Secure Content & Application Delivery (IDC)
• Founded in 1996 with a focus on Acceleration
– Accelerating Web applications…making Internet applications faster
– Innovative proxy caching appliance with object pipelining, adaptive
content refresh
• Expanded in 2002 to include Policy Control & Security
– Rich policy framework integrated with performance engine for visibility and
control of users, content and applications
• Visibility: Who, what, where, when, how
• Control: accelerate, deny, limit, scan, strip, transform…
Integrated Solution for Acceleration & Security
About Blue Coat
– Strategic Investments
– March 1996 Scalable Software (HTTP and OS Kernel)
– September 1999 Invertex (SSL Hardware Encryption)
– June 2000 Springbank Networks (Hardware Design and Routing
Protocols)
– December 2000 Entera (Streaming and Content Distribution)
– November 2003 Ositis (Virus scanning appliance)
– 2004 – Cerberian (Content filtering)
– 2006 – Permeo Technologies (SSL VPN & client security)
Integrated Solution for Acceleration & Security
Client Proxy Solution
Client Proxy
Byte Caching
Authentication
Logging
Protocol
detection
BW
management
Policy
Clients
Internet
Caching
Antivirus
Protocol
optimization
URL-Filtering
Compression
Application proxy
HTTP & HTTPS
Streaming
Yahoo-IM
AOL-IM
FTP
MSN-IM
Internet
MAPI
CIFS
.mp3
.xxx
P2P
Telnet/Shell
gral.se
?
DNS
TCP-Tunnel
SOCKS
How We Secure the Web
Intranet
Web
Server
Internal
Network

User logs onto network
 AAA:
and is authenticated via
NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Public
Web
Server
Public Internet
Authentication
NT, W2000 or
W2003 DC
RADIUS
Server
Netegrity
SiteMinder
Policy
Substitution
AD
Directory
Directory
Directory
Clients
Internet
LDAP
Client
Certifficate
On box
Database
Oblix
Directory
X509/CA
List
Directory
How We Secure the Web
Intranet
Web
Server
Internal
Network
Public
Web
Server


User logs onto network
 AAA:
and is authenticated via

NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Public Internet
How We Secure the Web
Intranet
Web
Server
Internal
Network



User logs onto network
 AAA:
and is authenticated via


NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Content Filtering: Requests
for content are controlled
using content filtering based
on granular policy
Public
Web
Server
Public Internet
Content Filtering
• Organizations need to control what users are doing when
accessing the internet to protect from legal liability and productivity
risks
• Blue Coat and our partners enable
enterprise-class content filtering
– Powerful granular user control using
Blue Coat’s Policy Processing Engine
• By user, group, destination IP and/or URL,
time of day, site, category, lots more
– Multiple logging and reporting options
– Integrates with all authentication
(LDAP, RADIUS, NTLM, AD, 2-factor, etc)
– Coaching, warnings, etc.
– High performance with integrated caching
– Drop-in appliance for easy to deploy and manage
– De-facto industry content filtering platform
Content filtering databases
WebWasher
Digital Arts
Smartfilter
InterSafe
Websense
Clients
Optenet
SurfControl
IWF
Proventia
Internet
Your lists
exceptions
BlueCoat
webfilter
DRTR
How We Secure the Web
Intranet
Web
Server
Internal
Network



Public Internet

User logs onto network
Bandwidth management:
 AAA:

and is authenticated via
Compression, Bandwidth


NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Content Filtering: Requests
for content are controlled
using content filtering based
on granular policy
Public
Web
Server
management and Streaming
media Caching and Splitting.
HTTP Compression
ProxySG can support a mixed mode of HTTP compression operation
Original Content Server (OCS) or Core ProxySG can send either (de)compressed content to
edge or core ProxySG using GZIP or Deflate algorithms
Core ProxySG
compressed
compressed
compressed
Edge ProxySG
uncompressed
uncompressed
Remote Office
compressed
ProxySG
uncompressed
HQ Office
compressed
uncompressed
Enterprise
uncompressed
Internet
Bandwidth Management (BWM)
OBJECTIVE
Classify, control and limit the amount of bandwidth
used by a class of network traffic
BENEFITS
Protect performance of mission critical applications
• SAP, ERP apps
Prevent bandwidth greedy applications from impacting other
applications
• P2P
Provision bandwidth for applications that require a per-session
amount of bandwidth
• Streaming
Balance necessary and important, bandwidth intensive, applications
• HTTP, IM
How We Secure the Web
Intranet
Web
Server
Internal
Network




Public Internet

User logs onto network
Bandwidth management:
 AAA:

and is authenticated via
Compression, Bandwidth


NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Content Filtering: Requests
for content are controlled
using content filtering based
on granular policy
Public
Web
Server
management and Streaming
media Caching and Splitting.
Virus scanning:
 Web
Potentially harmful content
entering network via HTTP,
HTTPS and FTP
is stripped or scanned
by ProxyAV.
Virus, Code & Script scanning
Other ICAP servers
Clients
Internet
Sophos
McAfee
Kaspersky
Panda
ProxyAV
ProxyAV
ProxySG & ProxyAV
- Large Enterprise/Network Core
- Scan once, serve many (cache benefit)
Internet
• Purpose-built appliances for
speed
• “Scan once, serve many” to
increase performance
• High-availability & loadbalancing
• Purpose built operating
systems
• Virus Scans HTTP, FTP
with caching benefit
• ProxySG Load Balances
ProxyAV
ProxySG
Internal
Network
How We Secure the Web
Intranet
Web
Server
Internal
Network


 

Public Internet

User logs onto network
Bandwidth management:
 AAA:

and is authenticated via
Compression, Bandwidth


NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Content Filtering: Requests
for content are controlled
using content filtering based
on granular policy
Public
Web
Server
management and Streaming
media Caching and Splitting.
Virus scanning:
 Web
Potentially harmful content
entering network from web
is stripped or scanned
by ProxyAV.
Prevention is better
 Spyware:
than a cure.
BlueCoat Spyware Prevention Solution
• Stops spyware installations
– Detect drive-by installers
Internet
• Blocks spyware websites
– On-Proxy URL categorization
• Scans for spyware signatures
ProxySG
– High-performance Web AV
• Detects suspect systems
– Forward to cleansing agent
Internal
Network
ProxyAV
How We Secure the Web
Intranet
Web
Server
Internal
Network



 

Public Internet

User logs onto network
Bandwidth management:
 AAA:

and is authenticated via
Compression, Bandwidth


NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Content Filtering: Requests
for content are controlled
using content filtering based
on granular policy
Public
Web
Server
management and Streaming
media Caching and Splitting.
Virus scanning:
 Web
Potentially harmful content
entering network from web
is stripped or scanned
by ProxyAV.
Prevention is better
 Spyware:
than a cure.
 IM Traffic Control: IM traffic
is subjected to policies and
is logged
IM Control with Blue Coat ProxySG
• Granular IM policy control
– By enterprise, group or user level
– Control by IM feature (IM only, chat, attachments,
video, etc.), internal or external IM, time of day, etc.
– Control IM options include deny connection,
strip attachment, log chat (including attachment)
– Key word actions include send alert to IT or
manager, log, strip, send warning message to user
• Drop-in appliance for easy to deploy
and manage IM control
How We Secure the Web
Intranet
Web
Server
Internal
Network



  


NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Content Filtering: Requests
for content are controlled
using content filtering based
on granular policy
Public Internet

User logs onto network
Bandwidth management:
 AAA:

and is authenticated via
Compression, Bandwidth

Public
Web
Server
management and Streaming
media Caching and Splitting.
Virus scanning:
 Web
Potentially harmful content
entering network from web
is stripped or scanned
by ProxyAV.
Prevention is better
 Spyware:
than a cure.
 IM Traffic Control: IM traffic

is subjected to policies and
is logged
Caching: Acceptable, clean
content is stored
in cache and delivered to
requestor.
Streaming acceleration
• Streaming
–
–
–
–
Microsoft Streaming & Native RTSP
Live Stream split, VOD Stream cache
Rich Streaming features, Unicast-Multicast
Scheduling live streaming from VOD
• Enhancements
– Store, Cache & distribute
Video On Demand
– Schedule VOD content to
be played as Live Content
– Convert between Multicast-Unicast
– Authenticate Streaming users
To NTLM, Ldap, RADIUS+Onbox
How We Secure the Web

Internal
Network



  


NTLM, AD (Single-Sign-on),
LDAP, Radius, Forms, local
password.
Policy Processing Engine:
All user web application
requests are subjected to
granular security policy
Content Filtering: Requests
for content are controlled
using content filtering based
on granular policy
Public Internet

User logs onto network
Bandwidth management:
 AAA:

and is authenticated via
Compression, Bandwidth

Public
Web
Server
management and Streaming
media Caching and Splitting.
Virus scanning:
 Web
Potentially harmful content
entering network from web
is stripped or scanned
by ProxyAV.
Prevention is better
 Spyware:
than a cure.
 IM Traffic Control: IM traffic


Intranet
Web
Server
is subjected to policies and
is logged
Caching: Acceptable, clean
content is stored
in cache and delivered to
requestor.
Reporting: All browser,
streaming, IM & virus activity,
can be reported using
Bluecoat's highly
configurable reporter.
Reporter
Blue Coat Webfilter
The Internet
The internet today consists of 350 million webservers.
A large ammount of these conatain information you
don’t want in your organisation.
A cleaver solution would be to use Content Filtering.
BlueCoat now introduces Generation 3 of content
filtering, BlueCoat Webfilter.
350 Million
Generation 1
The first generation of content filters consisted of
static manually managed lists of popular pornographic
and unproductive websites. Very often retreived from
access logs, popular bad sites where banned.
1 Million
The intended purpose was to save bandwidth and
warn users that inapropriate behaviour was logged.
People got together and distributed their lists in free
lists compatible with proxies such as Squid.
The distributed list where in the size of a million URL:s
349 Million
Generation 2
Corporations relised they could make money of a list
and started to collect lists and logs from the web, manually
rating these in larger scale. More categories where added
to increase value. The systems started to collect URL:S
autmatically and download new lists periodicly. Some
of them even many times every day.
15 Million
Special categories where added for static security threats
placed on known webservers, spyware phishing etc. Other
than bad sites where added such as Economy, business,
news etc. to present statistics of Internet usage.
335 Million
Generation 2
Number of URL:s was in the numbers of 10-20 millions.
Hitrates in logsystems presented was in the numbers of
50-80%. Regular expression on URL:s and other tricks
sometimes gave a false picture of rating over 90%. But in
fact less than 5% of the Internet was covered.
15 Million
335 Million
Generation 3
The dynamics of internet and new security risks
urged for a new way of categorizing the Internet,
Dynamic rating of uncategorized websites can today
rate most websites, the ones thats impossible to rate
could be stripped down to present only html and
images to reduce risk.
15 Million
The static URL database are constantly updated like
any Generation 2 filter. This database is cached in
some systems (ProxySG) to increase performance.
The rest (95%) of the Internet is categorised using
dynamic rating.
335 Million
Dynamic Real Time Rating
Internet
Servers
44µs
language 1
language 2
language 3
language 4
language 5
language n
DRTR
Clients
Customer
DXD
BlueCoat
* The picture is simplified, all systems are redundant.
To background rating
G2
Language detection
RS
DBR
HR
SSL Proxy
SSL Proxy: Policy Enforcement
•
Control web content, applications, and services…regardless of encryption
– Block, allow, throttle, scan, accelerate, insert, strip, redirect, transform …
– Apply the same policies to encrypted traffic as to normal traffic
– Stops/controls rogue applications that take advantage of SSL
•
Protect the enterprise from SSL-borne threats
– Stop spyware and secured phishing
– SSL-secured webmail and extranets – virus transmissions
– SSL-borne malicious and inappropriate content
•
Accelerate critical applications
– Enables a variety of acceleration techniques (e.g., caching)
Apps
SSL
Policy
SSL
User
Internet
Internal
Network
Blue Coat: Visibility and Context
Client-Proxy Connection
Client
Server-Proxy Connection
Proxy
Algorithms I support.
Connection Request.
Server
Algorithms I support.
Connection Request.
Verify certificate
and extract (proxy’s)
public key.
Let’s use
this algorithm.
Emulated certificate.
Complete
Authentication.
Complete
Authentication.
Tunnel Established
Verify certificate
and extract server’s
public key.
Complete
Authentication.
Use this algorithm.
Server’s digital
certificate.
Complete
Authentication.
Tunnel Established
Flexible Configurations
• Trusted applications passed through
– Sensitive, known, financial or health care
• No cache, visibility
Option 1
• Awareness of network-level
information only
Control
Apps
User
SSL
Internet
TCP
TCP
Flexible Configurations
• Initial checks performed
– Valid user, valid application
– Valid server cert
• User/application traffic passed through
after initial checks
• No cache
• Visibility and context of network-level info,
certificates, user, and applications
• Can warn user, remind of AUP, and
offer opt-out
Apps
Option 2
Control
User
SSL
Internet
TCP
TCP
Flexible Configurations
• Initial checks performed
– Valid user, valid application
– Valid server cert
• User/application traffic proxied after initial checks
• Full caching and logging options
• Visibility and context of network-level info,
certificates, user, applications, content, etc.
Option 3
– Full termination/proxy
• Can warn user, remind of AUP, and
offer opt-out
Control
Apps
User
Internet
SSL
SSL
TCP
TCP
Reverse Proxy
Reverse Proxy
Logging
Policy
Authentication
URL-rewrite
Internet
Clients
Servers
AV
SSL/Certificate
Caching
Reverse Proxy
PROTECTS Web Servers
ACCELERATES Web Content
• Secure, object-based OS
• Controls access to web apps
• Web AV scanning
• Intelligent caching
• Compression and bandwidth mgt.
• TCP & SSL offload
Web
Servers
ProxySG
Firewall
Internal
Network
Users
Public
Internet
Users
SIMPLIFIES Operations
• Scalable, optimized appliance
• Easy policy creation & management
• Complete logging & reporting
Secure & Accelerate Web Applications
HTTPS Termination
• HTTPS Termination (Client  ProxySG)
– Off-load secure website or portal
• HTTPS Origination (ProxySG  Server)
– Secure channel to content server for clients
• Man-in-the-Middle (Termination & Origination)
– Allows caching, policy and virus scanning
• Secure credential acquisitions
• SSL Hardware Acceleration Cards
– 800 RSA transactions per second per card
– SSL v2.0, v3.0, and TLS v1 support
• Off-load web application servers to improve
performance
Example Scenarios for Reverse Proxy
• Secure and Accelerate Public Websites
– Improves content delivery with integrated caching
– Services legitimate users while resisting DoS attacks
– High-performance SSL
• Secure Corporate Webmail
– Securely isolates Web servers from direct Internet
access
– Proxy authentication for additional layer of protection
– Plug-n-play SSL
• Scanning Uploaded Files for Viruses
– Simple integration with ProxyAV™
– Real-time scanning of uploaded content
– Protects Web infrastructure from malware
Accelerate Applications – All Users – All Locations
Recipe for Branch
Performance Problems
Server Consolidation
+ Increased application traffic
+ Inefficient application protocols
+ Highly distributed users
+
Narrow bandwidth links
= Poor Application Performance
Minimum for Application Acceleration
 Optimize use of existing WAN bandwidth
 Reduce latency associated with applications
 Improve the efficiency of application protocols
 Prioritize the applications that matter most
 Re-use and compress data where possible
 Accelerate File Sharing, Email, and browserbased enterprise applications
Complete Solution Requires More
Platform for Application Acceleration
Multiprotocol Accelerated Caching Hierarchy
Bandwidth
Protocol
Management Optimization
Object
Caching
Byte
Caching
Compression
File Services (CIFS), Web (HTTP), Exchange (MAPI),
Video/Streaming (RTSP, MMS), Secure Web (SSL)
New Requirement: SSL Acceleration
More and More SSL…
• Nearly 50% of all
corporate Web
application traffic is SSL
SSL Traffic
• 70% of all mobile and
teleworkers use SSL for
secure application
delivery
Internally
Hosted Apps
• 68% of Blue Coat
customers depend on
externally hosted Web
Externally
applications
Hosted Apps
Source: Blue Coat Customer Surveys
New Requirement: Video Acceleration
• Enterprise users
becoming more distributed
– Mobile, teleworker, and branch/
remote offices
– Regulatory and cost drivers
• Remote employee training
becoming a necessity
– Live (streaming) and on-demand video
• Performance quality
becoming a requirement
– Network and application issues must
be addressed
– Control and acceleration of video
is needed
Bandwidth Management
Sales Automation App
Priority 1
Min 400Kb, Max 800Kb
E-Mail
Priority 2
Min 100Kb, Max 400Kb
File Services
Priority 3
Min 400Kb, Max 800Kb
General Web Surfing
Priority 4
Min 0Kb, Max 200Kb
• Divide user and application traffic into classes
• Guarantee min and/or max bandwidth for a class
• Align traffic classes to business priorities
Protocol Optimization
Protocol Optimization
10-100X Faster
Includes CIFS, MAPI, HTTP, HTTPS, TCP
Object Caching
• Built on high-level applications and protocols
– HTTP/Web caching
– Streaming caches
– CIFS cache
• Advantages
– Fastest response times
– Offload work from servers (and networks)
– Can be deployed asymmetrically
• Limitations
– Application-specific
– All or nothing: No benefit if whole object not found or
changed
Byte Caching
Local History Cache
Remote History Cache
…..11011111001110011...111001111001
…..11011111001110011...111001111001
Sequences are
100101011101100100001101001100111
100101011101100100001101001100111
They are
The
original
001000001111000111001100011000001
001000001111000111001100011000001
found in the local
001111000000110111101001000011011 Proxies keep
001111000000110111101001000011011
transmitted
as
stream
is
history
cache
0001011111001010101011100110100111a history of all
0001011111001010101011100110100111
small
reconstructed
010011110010000000000001110010111
010011110010000000000001110010111
001011011011010010101100101100111 bytes sent
references over
using the 001011011011010010101100101100111
10001111111111000000000
10001111111111000000000
and received
the WAN
11011111001110010010010111001
10010101110110010000110100110
01110010000011110001110011000
11000001001111000000110111101
00100001101101001011111001101
00111011010011010011110010000
00000000111001011100101101101
1010010101100101100
Local LAN
remote history
cache
[R1]0010010[R2]1001011111
00110100111011010011[R3]
WAN Link
11011111001110010010010111001
10010101110110010000110100110
01110010000011110001110011000
11000001001111000000110111101
00100001101101001011111001101
00111011010011010011110010000
00000000111001011100101101101
1010010101100101100
Remote LAN
Compression
110111110011100100100
110111110011100100100
101110011001010111011
101110011001010111011
001000011010011001110
001000011010011001110
010000011110001110011
010000011110001110011
000110000010011110000
000110000010011110000
001101111010010000110 1101111100111001001001011100110010101110110010000 001101111010010000110
110100101111100110100 10011001110010000011110001110011000110000010011
110100101111100110100
111011010011010011110
111011010011010011110
010000000000001110010
010000000000001110010
111001011011011010010
111001011011011010010
101100101100010100100
101100101100010100100
101010101010100010111
101010101010100010111
COMPRESSION
• Industry-standard gzip algorithm compresses all traffic
• Removes predictable “white space” from content and
objects being transmitted
MACH5 Techniques Work Together
Object Caching
• Caches repeated, static app-level data; reduces BW and latency
Byte Caching
• Caches any TCP application using
similar/changed data; reduces BW
Compression
• Reduces amount of data transmitted; saves BW
Bandwidth Management
• Prioritize, limit, allocate, assign DiffServ – by user
or application
Protocol Optimization
• Remove inefficiencies, reduce latency
Object Caching
• Object caches are built on higher level applications and
protocols
– HTTP/Web caching
– Streaming caches
– CIFS cache
• Object cache advantages
– Fastest response times
– Offload work from servers
– Can be deployed asymmetrically
• Object cache disadvantages
– Works with limited set of applications
– Works on limited range of data inside applications
– All or nothing: No benefit if whole object not found or changed
Object vs. Byte Caching
Proxy?
Object Caching
Byte Cache
HTTP(S), FTP,
Streaming, CIFS
Built on TCP
Protocol Optimization Integration
X
Server Offload
X
Network Offload
X
X
Incremental Updates
X
No App Integration
X
End User Performance
Scope
Best
Good
Focused
Broad
Products
MACH5 Ships with Blue Coat SGOS 5
Corporate
Headquarters
SG8000 Series
SG800 Series
Remote
Offices
SG400 Series
SG200 Series
• GA April 2006
• Appliances start at US$1,995
Branch Office
Enterprise Core
ProxyAV Appliances
Corporate
Headquarters
2000-E Series
400-E Series
Remote
Offices
Connected
Users
Up to 250 users
100-2000 users
1000 -50,000+ users
WAN
Bandwidth
Sub 1.5Mbps
Bandwidth
1.5Mbps- 45Mbps
Bandwidth
150Mbps +
Bandwidth
Performance
400-E1
• One Model: 400-E1
• RAM: 512 MB
• CPU: 1.26GHz PIII
• Disk drive 40 GB IDE
• Network Interfaces (2 on board) 10/100 BaseT Ethernet
• 19" Rack-mountable
Software

Reporter (SW)

Advanced Java application to generate statistics from logs
Licenced products

Licensed products



Streaming
 Real Networks, Microsoft, Quicktime
Instant Messaging
 MSN, Yahoo, AOL
Optional Security (HW+SW bundle)
 SSL termination/proxy
Licenced products

Licensed products


Content filtering
 BlueCoat Webfilter
ICAP AV Scanner
 ProxyAV (McAfee, Sophos, Panda, Kaspersky, Ahn Labs)
The Power of the Proxy
Web Security
• Prevent spyware,
malware & viruses
• Stop DoS attacks
• IE vulnerabilities,
IM threats
Policy Control
+
• Fine-grained policy for applications,
protocols, content & users (allow,
deny, transform, etc)
• Granular, flexible logging
• Authentication integration
Accelerated Applications
+
• Multiprotocol
Accelerated Caching
Hierarchy
• BW mgmt, compression,
protocol optimization
• Byte & object caching
Full Protocol Termination = Total Visibility & Context
(HTTP, SSL, IM, Streaming, P2P, SOCKS, FTP, CIFS, MAPI, Telnet, DNS)
Ultimate Control Point for Communications
Management
Management
• User Interface
– HTTP (HTTPS), web GUI Interface
– Telnet (Cisco CLI)
– SSH & Serial console
– Java Policy interface
– CPL, Policy Language
– SNMP MIBII + Traps
– Monitor network status and statistics
•
Reporting tools
– BlueCoat Reporter
• Scalable management
– Centralized configuration management in Director
Reporting (example)
18.2 %
16.5 %
9.5 %
6.8 %
Spyware (gator)
Aftonbladet
Ad’s (in top 40)
https (encrypted)
System-wide Management and Control
• Blue Coat Director
– Centralized configuration of Blue Coat
appliances – set up, policy, etc
– Centralized monitoring – appliance health,
application use, user experience
• Blue Coat Reporter
– Enterprise roll-up and analysis of application
delivery information: appliances, application
use, user experience
Both Director and Reporter are proven, with
thousands of nodes under management…
Director configuration Management
Remotely and
securely manage
via GUI or CLI.
Workstation
• Configuration Management
• Policy Management
Director
(2) Snapshot profile
and save on
Director
“Profile” system
• Disaster protection centrally
Configuration Management
• Monitor and control
(3) Create and edit
overlays using GUI
or CLI.
• Resource Management
• Monitor network
status and statistics
• Profile Management
(4) Push profiles and
overlays to one
or more systems
(1) Configure and test
“profile” system
• Backup configuration
• Create overlays using GUI
or CLI. Automate changes
• License Management
Production systems
Content Delivery Network
Publish
content
1
WWW
Servers
4
Pull content
from origin
servers.
Content
Owners
Edge
Systems
Director
2
Tell Director
about new
content
3
Tell caches to
update content
5
Users
Deliver the
content.
Director GUI
K9 – For free
If you want to protect your family with Content Filtering
Blue Coat is now giving it away, read more at:
http://www.getk9.com/refer/Roger.Gotthardsson
Please send this link to anyone you want !!!!