Introducing Application Delivery Networking
Download
Report
Transcript Introducing Application Delivery Networking
Application Delivery Network
for Microsoft
Radovan Gibala
[email protected]
2
Agenda
Application Ready Network
– Introduction & Benefits
Basic Components of ARN
– Availability
– Performance
– Security
Deployment Infrastructure for Microsoft Applications
Exchange – Deployment Guides
SharePoint – Deployment Guides
Integration with MOM
3
IT Challenge - Out of Control
Applications and networks behave independently
Many network functions require high degrees of
manual intervention
Distributed architectures and web services increase
complexity
Historically, applications and protocols for
communicating with network devices inflexible at best
RESULT: Applications and Networks operate without regard to each
other limiting scale, performance, reliability, and security
4
Application Problems: Finger Pointing 101
Slow responses
Bloated data
XML, SOAP, ActiveX, JS
Office workers
telecommuters
Security risks
Application Attacks
Network Administrator
Many servers
Exchange, SharePoint
Application Developer
5
Application Problems: Finger Pointing 101
Slow responses
Bloated data
Security risks
Many servers
Exchange,
SharePoint
XML, SOAP,
ActiveX, JS
Application Attacks
*@#!
?
?
User
Office workers;
telecommuters
Network Administrator
Application Developer
6
10 Most Common Deployment Mistakes
1
Lack of end-user involvement or it happens at the end (too late)
2
The solution is ‘thrown over the wall’ to the infrastructure team!
3
No clear session management approach
4
No clear separation of business logic from the user interface
5
There is no predictable build process of the solution
6
Testers are testing the developers – but who is testing the testers?
7
Performance & security design is kept till the end of the project
8
Browser compatibility is on the agenda yet testing is under estimated
9
Accessibility, globalization and localization are forgotten
10
In accurate project estimates, lack of financial control and frequent financial/time
reconciliation processes
Note: The majority of these are infrastructure and process issues.
Source: Vajira Weerasekera
Principal Consultant – Microsoft Solutions Development Center
7
F5 Networks’ Application Ready Network for Microsoft
Fast responses
Slow
Smaller data
data
Bloated
Stops attacks
Security
risks
Fewerservers
servers
Many
*@#!
User
Network Administrator
Application Developer
8
The F5 Business Value
Reduces company risks by protection of critical
applications against security threats
simplify the application
deployment process !!!
Simplify the
operational
manageability
Reduce the number
of Hardware (servers)
or
Downsize server size
Improves application
Reduce
maintenance
effort
PERFORMANCE
Significantly!
Increased availability, scalability and security drives
increased business productivity and faster ROI
9
Most Cost-Effective Business Continuity
Intelligent & Automated DNS, the Gateway to the Application
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
WANJet
BIG-IP Local
Traffic
Manager
Web
Accelerator
Applications
ASM
Application
Security
Manager
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
10
Put Connectivity in the Control of the Enterprise
Intelligent and Automated WAN & Link Optimization / for Applications
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
WANJet
BIG-IP Local
Traffic
Manager
Web
Accelerator
Applications
ASM
Application
Security
Manager
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
Provide Cost-Effective, Secure Application Access for
All Users - Universal Access Control
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
WANJet
BIG-IP Local
Traffic
Manager
Web
Accelerator
Applications
ASM
Application
Security
Manager
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
11
Offload All Applications for
Availability, Acceleration & Security
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
WANJet
BIG-IP Local
Traffic
Manager
Web
Accelerator
Applications
ASM
Application
Security
Manager
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
12
13
The Data
Center Products
Expect:
BIG-IP Local Traffic
Manager
• Very high
availability
Data center optimization
Application
• Less servers
Load balancing
Caching
Servers
• Significant traffic reduction
Compression
• Significant speed improvement
Rate Shaping
• Improved session persistence
SSL / FIPS acceleration
TCP Optimisation•
Higher degree of control
• Vastly increased security
Connection optimisation
• Improved flow management
• Increased scalability
• Lower cost
Switch
14
BIG-IP Security Add-On Modules
Application Security Module
SSL Acceleration
Protect applications and data
Protect data over the Internet
Advanced Client
Authentication Module
Protect against unauthorised
access
15
BIG-IP Software Add-On Modules
Quickly Adapt to Changing Application & Business Challenges
Compression Module
Increase performance
Webaccelerator
- Fast Cache Module
Offload servers
Rate Shaping Module
Reserve bandwidth
16
Accelerate Applications for Unmanaged Users
Centralize & Accelerate Web Application Optimization
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
BIG-IP Local
Traffic
Manager
Web
Accelerator
WANJet
Applications
ASM
Application
Security
Manager
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
17
Offload and Centralize Application Security:
Prevent Zero Day Attacks
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
WANJet
BIG-IP Local
Traffic
Manager
Web
Accelerator
ASM
Application
Security
Manager
Applications
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
18
Security’s Gaping Hole
“64% of the 10 million
security incidents tracked
targeted port 80.”
Information Week
DATA
19
Application Security with a WAF
Intelligent Decisions
Allow Only Good
Application Behaviour;
Positive Security
Browser
Definition of Good
and Bad Behaviour
Manage the Application Delivery Network for Op Efficiency
Centralized Management and Infrastructure Integration
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
WANJet
BIG-IP Local
Traffic
Manager
Web
Accelerator
ASM
Application
Security
Manager
Applications
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
20
21
Open ADN Web Services API for Integration
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
BIG-IP Local
Traffic
Manager
Web
Accelerator
WANJet
Applications
ASM
Application
Security
Manager
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
22
Unified and Modular Architecture
A High Performance Framework for the ADN
International
Data Center
Enterprise Manager
Users
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
FirePass
SSL VPN
WANJet
BIG-IP Local
Traffic
Manager
Web
Accelerator
Applications
ASM
Application
Security
Manager
iControl
TMOS
Business Goal: Achieve these objectives in the most operationally efficient manner
23
The Most Intelligent and Adaptable Solution
iRules
Programmable Network Language
Programmable
Application
Network
GUI-Based Application Profiles
Repeatable Policies
Unified Application Infrastructure Services
Targeted and
Adaptable
Functions
Security
Optimisation
Delivery
New Service
Universal Inspection Engine (UIE)
Complete Visibility
and Control of
Application Flows
TM/OS
Fast Application Proxy
Client
Side
Compression
News Website
TCP Offloading
Load Balancing
Server
Side
24
Deployment Guides
25
Exchange 2007 Deployment
26
F5 Benefits for Exchange 2007
Reliable, Real-Time Availability
Optimized Data Replication Between Data
Centers. More Data, Less Time
Secure Point-To-Point Data Replication
Efficiently Use Existing Bandwidth == Less $$
27
SharePoint 2007 Deployment
28
F5’s Benefits for SharePoint
Increase SharePoint Server Performance by 5x
20-30% Bandwidth Reduction for Remote Users
Gain 25+% Server Capacity with Service Offload
Reduce Time-Out Errors by 85% for Mobile Users
Automated Failover and Access Control
29
SharePoint 2007 Global Deployment
30
Global Application Health
Application Aware Monitoring: Back-end system
goes down, entire application is taken down and
users are re-routed
Global Failover Based on Application Health,
Not Just Server and Data Center Health
Lose an app in Warszawa, Redirect Users to
Praha, Transparently
Full Integration From Remote Data Centers
Down to Users
31
Application Security
and User Control
32
Requirements For Application Security
Securing user AND transaction access to
applications and data is critical to completely
securing enterprise IT
User/transaction validity
App & data access auth.
Unauthorized
User From A Valid
Terminal
Partner
Employee
Customer
Corporate IP Network
Corporate Apps
& Data
Invalid
Transaction From
A Valid System
Contextual Security: Policy Management
33
F5 Sharepoint Security Benefits
Secure Session Management
Inline Reverse Proxy Sees All Data,
Requests and Responses
Granular Application Control
Session-Based Policy Management
Accountability: Audit Trail
Application Delivery Security
34
Exchange User Access 2007 Deployment
35
Secure Microsoft Access
Any Device
• Laptops
• Home PCs
• Smart phones
• PDAs
• Wi-Fi access
Unified Access
Gateway
Outlook Web Access
iNotes
Web-based CRM
HR Data
Internet
Any User
• Suppliers
• Consultants
• Branch office employees
• Telecommuters
• Mobile employees
• Partners
Servers, applications,
intranet servers
Any Application
• Mainframe
• Client-server
• Web-based
• Web Services
Broad user, clients and application support
36
Unified Access Gateway and Outlook
Integration: Secure User Access to Exchange
via Outlook or OWA
Granularity: Application Awareness and
Control
Flexibility: Multiple Secure Access Solutions
Specific to Your Mail Infrastructure
Client-less for All Users
37
Unified Access Gateway and SharePoint
Secure User Access to SharePoint
Intelligent Content Distribution based on
access platform
Send only the data I need, nothing more
Vista == Full graphic experience
WinMobile == No DHTML, just data
38
F5 Security/Windows Interoperability
Vista GINA integration
Internet Explorer 7 support
Windows Installer
Auto-launch Web
AppTunnels
Enhanced user-session
variables for Active
Directory, and networking
39
Call To Action
Application Ready Network for Microsoft
Workshops
40
41
MTC Engagement Types
Strategy briefings
Architecture design session – customised session
Proof of Concept workshop
MTC locations in EMEA
- Copenhagen, Denmark
- Dubai, UAE
- Munich, Germany
- Paris, France
- Thames Valley, UK
42
F5 Technology Center
Hosted Strategy Briefings
Architecture Design – Customized Sessions
On-site Technical Expertise
Proof of Concept, Real-World Implementation
Located At F5 Headquarters in Seattle, WA
43
Application Ready Network for MS
Users
At Home
Vista
In the Office
Applications
Application
Ready
Network
SAP 2007
SharePoint
XP
On the Road
Exchange
Exchange
2007
Oracle
Mobile PC
Active Directory
F5 Adds More Performance, Security, Availability, and Scalability
to your MS Application Roll-Out