SlideShare a Scribd company logo
1 of 9
50 Ways to Use BIG-IP
Performance Caching (WA) Geolocation (GTM, LTM) Quality of Service (QoS, Rate shaping) Data deduplication (WOM) WAN Optimization (WOM)  Rate limiting (iRules)  Long-distance VMotion (LTM)  DTLS for PCoIP (LTM)
Security Protocol Security (PSM)  Port lockdown (LTM)  DNSSEC (GTM)  E-mail security (MSM) Application access control (APM)  IP Blacklisting (ASM)  SQLi Prevention (ASM)  XSS Attack prevention (ASM)  Cookie encryption (LTM)  XML Security (ASM)  Secure remote access (APM, Firepass)  Data leak prevention (ASM, iRules) FTP Security (ASM)
Visibility Heatmaps (iRules)  End-point inspection (Firepass, APM)  Traffic inspection (iRules)
Optimization Compression (WA, WOM)  TCP Offload (LTM)  SSL Offload (LTM)  HTTP Optimization (LTM)  Centralized certificate management (SSL)  Single Sign-On (APM, EGW)
Architecture Application switching (iRules)  URL rewriting (iRules)  Resource obfuscation (iRules)  URL shortener (iRules)  Application virtualization (LTM)  IPv6 Gateway PKI CAC Integration (LTM, SSL) Honeypot redirection (ASM)  Cookie gateway/proxy (LTM, iRules) Custom error pages (iRules) XML Routing (iRules)
Availability Load balancing (LTM)  Failover (LTM)  Global server load balancing (GTM)  Auto-scaling (LTM, iControl)  SIP Load balancing (LTM)  LDAP proxy (iRules)  Link Load balancing (LC) DDoS protection (LTM) Sticky sessions (LTM)
Load balancers are dead… PSSST! Remember this secret phrase for an extra chance to win a cool prize at Interop Las Vegas:   LONG LIVE APPLICATION DELIVERY
All 50 Ways to Use BIG-IP

More Related Content

Viewers also liked

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
F5 Networks
 
защита Web приложений f5 cti
защита Web приложений f5 ctiзащита Web приложений f5 cti
защита Web приложений f5 cti
CTI_analytics
 
F5 big v10_websecurity pressshort-phpapp01
F5 big v10_websecurity pressshort-phpapp01F5 big v10_websecurity pressshort-phpapp01
F5 big v10_websecurity pressshort-phpapp01
Netka System
 

Viewers also liked (16)

BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
F5 rus-e-crime-14
F5 rus-e-crime-14F5 rus-e-crime-14
F5 rus-e-crime-14
 
защита Web приложений f5 cti
защита Web приложений f5 ctiзащита Web приложений f5 cti
защита Web приложений f5 cti
 
BACIK CISCO SKILLS
BACIK CISCO SKILLSBACIK CISCO SKILLS
BACIK CISCO SKILLS
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
 
Nat
NatNat
Nat
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
 
Eng tenses 1
Eng tenses 1Eng tenses 1
Eng tenses 1
 
F5 big v10_websecurity pressshort-phpapp01
F5 big v10_websecurity pressshort-phpapp01F5 big v10_websecurity pressshort-phpapp01
F5 big v10_websecurity pressshort-phpapp01
 
Virtual Edition
Virtual EditionVirtual Edition
Virtual Edition
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 

Similar to All 50 Ways to Use BIG-IP

Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to TendenciesOramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Luis Lobo e Silva
 
Oramix - IP Core Engineering & Project Management
Oramix - IP Core Engineering & Project ManagementOramix - IP Core Engineering & Project Management
Oramix - IP Core Engineering & Project Management
Luis Lobo e Silva
 

Similar to All 50 Ways to Use BIG-IP (20)

Skills Summary for GASteele
Skills Summary for GASteeleSkills Summary for GASteele
Skills Summary for GASteele
 
Nuuo presentation 1102
Nuuo presentation 1102Nuuo presentation 1102
Nuuo presentation 1102
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpan
 
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to TendenciesOramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
 
Oramix - IP Core Engineering & Project Management
Oramix - IP Core Engineering & Project ManagementOramix - IP Core Engineering & Project Management
Oramix - IP Core Engineering & Project Management
 
Functions of osi layer in computer networks
Functions of osi layer in computer networksFunctions of osi layer in computer networks
Functions of osi layer in computer networks
 
Wtls
WtlsWtls
Wtls
 
huawei-ar207-brochure-datasheet.pdf
huawei-ar207-brochure-datasheet.pdfhuawei-ar207-brochure-datasheet.pdf
huawei-ar207-brochure-datasheet.pdf
 
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In ...
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
MoteChat
MoteChatMoteChat
MoteChat
 
G-Clouds Architecture and Security (fragment of course materials)
G-Clouds Architecture and Security (fragment of course materials)G-Clouds Architecture and Security (fragment of course materials)
G-Clouds Architecture and Security (fragment of course materials)
 
Bloombase StoreSafe Specifications
Bloombase StoreSafe SpecificationsBloombase StoreSafe Specifications
Bloombase StoreSafe Specifications
 
Sl3c3
Sl3c3Sl3c3
Sl3c3
 
Tavve Zone Ranger
Tavve   Zone RangerTavve   Zone Ranger
Tavve Zone Ranger
 
Evolution of the IT Architect - Dec 2016
Evolution of the IT Architect - Dec 2016Evolution of the IT Architect - Dec 2016
Evolution of the IT Architect - Dec 2016
 
Unit 5 m commerce
Unit 5 m commerceUnit 5 m commerce
Unit 5 m commerce
 

More from F5 Networks

More from F5 Networks (20)

F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

All 50 Ways to Use BIG-IP

  • 1. 50 Ways to Use BIG-IP
  • 2. Performance Caching (WA) Geolocation (GTM, LTM) Quality of Service (QoS, Rate shaping) Data deduplication (WOM) WAN Optimization (WOM) Rate limiting (iRules) Long-distance VMotion (LTM) DTLS for PCoIP (LTM)
  • 3. Security Protocol Security (PSM) Port lockdown (LTM) DNSSEC (GTM) E-mail security (MSM) Application access control (APM) IP Blacklisting (ASM) SQLi Prevention (ASM) XSS Attack prevention (ASM) Cookie encryption (LTM) XML Security (ASM) Secure remote access (APM, Firepass) Data leak prevention (ASM, iRules) FTP Security (ASM)
  • 4. Visibility Heatmaps (iRules) End-point inspection (Firepass, APM) Traffic inspection (iRules)
  • 5. Optimization Compression (WA, WOM) TCP Offload (LTM) SSL Offload (LTM) HTTP Optimization (LTM) Centralized certificate management (SSL) Single Sign-On (APM, EGW)
  • 6. Architecture Application switching (iRules) URL rewriting (iRules) Resource obfuscation (iRules) URL shortener (iRules) Application virtualization (LTM) IPv6 Gateway PKI CAC Integration (LTM, SSL) Honeypot redirection (ASM) Cookie gateway/proxy (LTM, iRules) Custom error pages (iRules) XML Routing (iRules)
  • 7. Availability Load balancing (LTM) Failover (LTM) Global server load balancing (GTM) Auto-scaling (LTM, iControl) SIP Load balancing (LTM) LDAP proxy (iRules) Link Load balancing (LC) DDoS protection (LTM) Sticky sessions (LTM)
  • 8. Load balancers are dead… PSSST! Remember this secret phrase for an extra chance to win a cool prize at Interop Las Vegas: LONG LIVE APPLICATION DELIVERY