SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Network Design and Security for
Your VMware View Deployment
with VMware and F5
Philippe Bogaerts
Senior Field Systems Engineer - Benelux
© F5 Networks, Inc.
F5 & VMware
• F5 & VMware are global partners
• 5+ years of history
• Primary partnership goals
 Compatibility / Interoperability testing
 New Solution Development & Documentation
• Across all major F5 and VMware products
• Ongoing cooperative solution development
© F5 Networks, Inc.
Recent Highlights
• F5 named Technology Innovator Partner of the Year
 VMware awards highest honor to F5 at 2011 Partner Exchange
 Recognition for deep integration and solution development
• “VMware-Ready” certifications
• F5 BIG-IP, ARX and FP Virtual Edition appliances
• vSphere, vCloud Director, View
• Single Unified Namespace
• iApp rapid solution deployment for View 4.6, 5.0
• vSphere 5.0 Metro-Distance Live Migration
• Netapp FlexCache, EMC VPLEX
© F5 Networks, Inc.
Common Desktop Virtualization Challenges
• User Experience
• Performance over the Wide Area Network
• Access methods / complexity
• Login steps / annoyance
• Security
• Encryption of all WAN traffic
• Unified Access (Local vs. Remote, Desktop vs. Smart Phone)
• Integration with existing authentication infrastructure
• Endpoint integrity inspection
• Scalability/Availability
• Ensuring total availability of connection servers, VMs
• Single unified namespace across datacenters
© F5 Networks, Inc.
• VMware abstracts all hosts and and storage into “one big
computer”
• F5 connects users to applications running on vSphere
F5 Networks: Application Delivery
Networking
© F5 Networks, Inc.
Why Does Application Delivery Networking
Matter for Virtualization Projects?
Servers are more agile
Storage is more agile
Applications are more agile
Clients are more agile
Data centers are more agile
What’s missing?
The network!
© F5 Networks, Inc.
Taking A Step Back: What’s The Point?
Application Delivery Networking
F5 Networks
© F5 Networks, Inc.
Application Delivery Networking
• Control point for all traffic inbound and outbound
• Separate user connections from server connections
• Dynamically apply appropriate policies
Full Proxy
© F5 Networks, Inc.
Application Delivery Networking
• Encrypt application and data in transit
• User and Device authentication & authorization
Security
© F5 Networks, Inc.
Application Delivery Networking
• Caching
• Protocol optimization
Acceleration
© F5 Networks, Inc.
Application Delivery Networking
• Load balancing
• Persistence
• Connection Multiplexing
High Availability
© F5 Networks, Inc.
4 Key Functions of Application Delivery Networking
Scaling Migrating
Protecting Managing
© F5 Networks, Inc.
Architecture
© F5 Networks, Inc.
Connection ServersConnection Servers
BIG-IP LTM + APM
Remote Clients
Local LAN Clients
Local Mode Desktop
Primary Site
Centralized Virtual
Desktops
Internet
Encryption (DTLS or SSL)
Unencrypted RDP or Natively Encrypted PCoIP)
Security ServersSecurity Servers
Secondary
BIG-IP GTM
© F5 Networks, Inc.
User Experience
© F5 Networks, Inc.
Simplify Sign-On Frustrations
Step 1
Local
Login
Step 2
VPN
Login
Step 3
Desktop
Login
SSO
Login
Once
© F5 Networks, Inc.
Traffic QoS
View
Desktops
Rate Shape to ensure client-side View traffic receives priority
over client-outbound outbound traffic
Edge
Client
Edge
Client
Edge
Client
© F5 Networks, Inc.
Security
© F5 Networks, Inc.
Unify Access to the Data Center
DMZ
Use existing user directories
View Servers
BIG-IP Edge Gateway
• One solution to manage all access policies regardless of access
network
• Capacity and performance to secure all user traffic
• Optimizes application delivery to remote and mobile users
• Improves quality of real-time applications; soft phones and
streaming media
Mobile Users
Wireless Users
Internet
Branch Office Users
Internal LAN
VLAN2
LAN Users
Internal LAN
VLAN1
© F5 Networks, Inc.
Unified AAA Services for View
• Pre-Logon Checks:
• OS, AV, firewall, process, file, registry, extended windows info,
client and machine certs, etc.
• Remediation:
• Group Policy enforcement (Corp & Non-Corp Assets)
• Protected Workspace
• Intuitive, Visual Policy Editor
© F5 Networks, Inc.
Optimize Authentication & Authorization
• Integration with existing authentication mechanisms
• AD, LDAP, RADIUS, 2-Factor, Client Certs, Etc.
• Support for PKI infrastructures
• Extensible and scriptable
• Comprehensive auditing/accounting
• Check the device prior to logon
• OS, AV, firewall, process, file, registry, 2-factor auth,
client/machine certs, etc.
• Remediate if necessary, automatically
• Use protected workspaces for untrustworthy devices
• Enforce Group Policies on all assets (even non-corporate assets)
• Meets FIPS compliance requirements
© F5 Networks, Inc.
DMZ
Stringent Corporate Security Policies
View Security Server
Running on
Windows Server
2008 R2
BIG-IP APM
FIPS Compliant
Appliance
Connection Server
Connection Servers
BIG-IP provides a high capacity, FIPS compliant alternative to the View Security Server
Up to 2,000
concurrent
users per
server, 10,000
per pod.
Up to 40,000
concurrent
users on a
single device
© F5 Networks, Inc.
Maintain Native PCoIP Performance
Connection
Brokers
Mobile Users
Remote Users
Branch Office Users
LAN Users
DTLS Encryption
View
Servers
DTLS Encryption
SSL Encryption
PCoIP
PCoIP
RDP
DTLSEncryptionPCoIP
Support for DTLS (UDP) encryption
Support for SSL (TCP) encryption
Avoids the alternative method of
encapsulating UDP into TCP for SSL
encryption (thus degrading UDP).
© F5 Networks, Inc.
Availability & Scalability
in the Data Center
© F5 Networks, Inc.
Enable Scalability by Offloading Processes
from View Connection Servers
1. Improve efficiency by offloading SSL
2. HA & load balancing for View Connection Servers
Connection
Servers
© F5 Networks, Inc.
Local Mode Acceleration
BIG-IP Edge Gateway
View pod
BIG-IP Edge Gateway
WAN
Optimized
Link
Branch Office
Datacenter
Local Mode
Check-out
Check-in
Synch
© F5 Networks, Inc.
DMZ
Ubiquitous View Client Support for Large Deployments
View Security Server
BIG-IP LTM
FIPS Compliant
Appliance
Connection Servers
BIG-IP allows thick, thin, and zero clients access to View deployments, which are > 2000 users
© F5 Networks, Inc.
DMZ
Maximum Scalability for View
BIG-IP APM
BIG-IP Global
Traffic Manager
BIG-IP Local
Traffic Manager
Pod 2
Pod 1
DMZ
BIG-IP APM
BIG-IP Local
Traffic Manager
Pod 3
Max 10,000 users
Per Cluster
Global Load
Balancing Among
Multiple Sites
Local Load
Balancing >70,000
concurrent users
@ 1Mbps each on
a single device
BIG-IP enables you to make multiple sites and multiple clusters, look like one big cohesive unit
© F5 Networks, Inc.
• iApps: Rapid, tested, streamlined, best practice deployment
 iApp for VMware View 5.0
 Deploy F5 LTM and APM in a matter of
minutes
 Provide best practice configuration
 Avoid human error
F5 iApps: Rapid Deployment for Enterprise
Applications
© F5 Networks, Inc.
• Rapid, tested, streamlined, best practice deployment of F5
functionality for VMware View environments
F5 iApp for VMware View
© F5 Networks, Inc.
Summary – VMware View & F5
• Improve and streamline User Experience
• Integrate, simplify, and unify Security
• Scale and provide global High Availability
• Reduce OPEX and CAPEX
Flexible deployment architectures and product
Platforms to support any size enterprise View deployment
© F5 Networks, Inc.
Thank You
F5 Networks
www.f5.com/vmware

Weitere ähnliche Inhalte

Was ist angesagt?

F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10
F5 Networks
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
F5 Networks
 

Was ist angesagt? (20)

F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IP
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
F5 Cloud Story
F5 Cloud StoryF5 Cloud Story
F5 Cloud Story
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructure
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
 
F5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle DatabaseF5 Networks Adds To Oracle Database
F5 Networks Adds To Oracle Database
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
GDPR v pojetí F5
GDPR v pojetí F5GDPR v pojetí F5
GDPR v pojetí F5
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitch
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
Taking the Fear out of WAF
Taking the Fear out of WAFTaking the Fear out of WAF
Taking the Fear out of WAF
 

Andere mochten auch

Network Security
Network SecurityNetwork Security
Network Security
phanleson
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Błażej Matusik
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
Netri Chowdhary
 
Remote Desktop Services Component Architecture
Remote Desktop Services Component ArchitectureRemote Desktop Services Component Architecture
Remote Desktop Services Component Architecture
Paulo Freitas
 

Andere mochten auch (20)

PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006 PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006
 
Sectools
SectoolsSectools
Sectools
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
 
Why HATEOAS
Why HATEOASWhy HATEOAS
Why HATEOAS
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
 
Remote Desktop Services Component Architecture
Remote Desktop Services Component ArchitectureRemote Desktop Services Component Architecture
Remote Desktop Services Component Architecture
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
 
Dmz
DmzDmz
Dmz
 
Chapter08
Chapter08Chapter08
Chapter08
 
Industry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter BrownIndustry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter Brown
 
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
Remote Desktop Services and Virtual Desktop infrastructure in Windows Server ...
 
Microsoft Remote Desktop Services
Microsoft Remote Desktop ServicesMicrosoft Remote Desktop Services
Microsoft Remote Desktop Services
 
Network Virtualization with VMware NSX
Network Virtualization with VMware NSXNetwork Virtualization with VMware NSX
Network Virtualization with VMware NSX
 
PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006 PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006
 
Chapter 1 How to Design a LAN
Chapter 1 How to Design a LANChapter 1 How to Design a LAN
Chapter 1 How to Design a LAN
 
PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006 PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006
 

Ähnlich wie Presentation network design and security for your v mware view deployment with vmware and f5

F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
Patricio Campos
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
sflynn073
 

Ähnlich wie Presentation network design and security for your v mware view deployment with vmware and f5 (20)

Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lk
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
VMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld 2015: No App is An Island
VMworld 2015: No App is An Island
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
Windows 7 For Itpro
Windows 7 For ItproWindows 7 For Itpro
Windows 7 For Itpro
 

Mehr von solarisyourep

Presentation a new era in it
Presentation   a new era in itPresentation   a new era in it
Presentation a new era in it
solarisyourep
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computing
solarisyourep
 
Presentation advanced management – the road ahead
Presentation   advanced management – the road aheadPresentation   advanced management – the road ahead
Presentation advanced management – the road ahead
solarisyourep
 
Presentation architecting a cloud infrastructure
Presentation   architecting a cloud infrastructurePresentation   architecting a cloud infrastructure
Presentation architecting a cloud infrastructure
solarisyourep
 
Presentation architecting virtualized infrastructure for big data
Presentation   architecting virtualized infrastructure for big dataPresentation   architecting virtualized infrastructure for big data
Presentation architecting virtualized infrastructure for big data
solarisyourep
 
Presentation avoiding the 19 biggest ha & drs configuration mistakes
Presentation   avoiding the 19 biggest ha & drs configuration mistakesPresentation   avoiding the 19 biggest ha & drs configuration mistakes
Presentation avoiding the 19 biggest ha & drs configuration mistakes
solarisyourep
 
Presentation blade center foundation for cloud
Presentation   blade center foundation for cloudPresentation   blade center foundation for cloud
Presentation blade center foundation for cloud
solarisyourep
 
Presentation building and running your private cloud
Presentation   building and running your private cloudPresentation   building and running your private cloud
Presentation building and running your private cloud
solarisyourep
 
Presentation building your cloud with v mware
Presentation   building your cloud with v mwarePresentation   building your cloud with v mware
Presentation building your cloud with v mware
solarisyourep
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual env
solarisyourep
 
Presentation cim1309 v cat 3.0 operating a v-mware cloud
Presentation   cim1309 v cat 3.0 operating a v-mware cloudPresentation   cim1309 v cat 3.0 operating a v-mware cloud
Presentation cim1309 v cat 3.0 operating a v-mware cloud
solarisyourep
 
Presentation cisco intelligent automation complementing and extending v mwa...
Presentation   cisco intelligent automation complementing and extending v mwa...Presentation   cisco intelligent automation complementing and extending v mwa...
Presentation cisco intelligent automation complementing and extending v mwa...
solarisyourep
 
Presentation cisco vxi–optimized infrastructure for scaling v mware view wi...
Presentation   cisco vxi–optimized infrastructure for scaling v mware view wi...Presentation   cisco vxi–optimized infrastructure for scaling v mware view wi...
Presentation cisco vxi–optimized infrastructure for scaling v mware view wi...
solarisyourep
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
solarisyourep
 
Presentation cloud infrastructure launch – what’s new
Presentation   cloud infrastructure launch – what’s newPresentation   cloud infrastructure launch – what’s new
Presentation cloud infrastructure launch – what’s new
solarisyourep
 
Presentation cloud meets big
Presentation   cloud meets bigPresentation   cloud meets big
Presentation cloud meets big
solarisyourep
 
Presentation consuming a cloud
Presentation   consuming a cloudPresentation   consuming a cloud
Presentation consuming a cloud
solarisyourep
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
solarisyourep
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
solarisyourep
 
Presentation drs advanced concepts, best practices and future directions
Presentation   drs advanced concepts, best practices and future directionsPresentation   drs advanced concepts, best practices and future directions
Presentation drs advanced concepts, best practices and future directions
solarisyourep
 

Mehr von solarisyourep (20)

Presentation a new era in it
Presentation   a new era in itPresentation   a new era in it
Presentation a new era in it
 
Presentation a vision for user centric computing
Presentation   a vision for user centric computingPresentation   a vision for user centric computing
Presentation a vision for user centric computing
 
Presentation advanced management – the road ahead
Presentation   advanced management – the road aheadPresentation   advanced management – the road ahead
Presentation advanced management – the road ahead
 
Presentation architecting a cloud infrastructure
Presentation   architecting a cloud infrastructurePresentation   architecting a cloud infrastructure
Presentation architecting a cloud infrastructure
 
Presentation architecting virtualized infrastructure for big data
Presentation   architecting virtualized infrastructure for big dataPresentation   architecting virtualized infrastructure for big data
Presentation architecting virtualized infrastructure for big data
 
Presentation avoiding the 19 biggest ha & drs configuration mistakes
Presentation   avoiding the 19 biggest ha & drs configuration mistakesPresentation   avoiding the 19 biggest ha & drs configuration mistakes
Presentation avoiding the 19 biggest ha & drs configuration mistakes
 
Presentation blade center foundation for cloud
Presentation   blade center foundation for cloudPresentation   blade center foundation for cloud
Presentation blade center foundation for cloud
 
Presentation building and running your private cloud
Presentation   building and running your private cloudPresentation   building and running your private cloud
Presentation building and running your private cloud
 
Presentation building your cloud with v mware
Presentation   building your cloud with v mwarePresentation   building your cloud with v mware
Presentation building your cloud with v mware
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual env
 
Presentation cim1309 v cat 3.0 operating a v-mware cloud
Presentation   cim1309 v cat 3.0 operating a v-mware cloudPresentation   cim1309 v cat 3.0 operating a v-mware cloud
Presentation cim1309 v cat 3.0 operating a v-mware cloud
 
Presentation cisco intelligent automation complementing and extending v mwa...
Presentation   cisco intelligent automation complementing and extending v mwa...Presentation   cisco intelligent automation complementing and extending v mwa...
Presentation cisco intelligent automation complementing and extending v mwa...
 
Presentation cisco vxi–optimized infrastructure for scaling v mware view wi...
Presentation   cisco vxi–optimized infrastructure for scaling v mware view wi...Presentation   cisco vxi–optimized infrastructure for scaling v mware view wi...
Presentation cisco vxi–optimized infrastructure for scaling v mware view wi...
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Presentation cloud infrastructure launch – what’s new
Presentation   cloud infrastructure launch – what’s newPresentation   cloud infrastructure launch – what’s new
Presentation cloud infrastructure launch – what’s new
 
Presentation cloud meets big
Presentation   cloud meets bigPresentation   cloud meets big
Presentation cloud meets big
 
Presentation consuming a cloud
Presentation   consuming a cloudPresentation   consuming a cloud
Presentation consuming a cloud
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Presentation drs advanced concepts, best practices and future directions
Presentation   drs advanced concepts, best practices and future directionsPresentation   drs advanced concepts, best practices and future directions
Presentation drs advanced concepts, best practices and future directions
 

Presentation network design and security for your v mware view deployment with vmware and f5

  • 1. Network Design and Security for Your VMware View Deployment with VMware and F5 Philippe Bogaerts Senior Field Systems Engineer - Benelux
  • 2. © F5 Networks, Inc. F5 & VMware • F5 & VMware are global partners • 5+ years of history • Primary partnership goals  Compatibility / Interoperability testing  New Solution Development & Documentation • Across all major F5 and VMware products • Ongoing cooperative solution development
  • 3. © F5 Networks, Inc. Recent Highlights • F5 named Technology Innovator Partner of the Year  VMware awards highest honor to F5 at 2011 Partner Exchange  Recognition for deep integration and solution development • “VMware-Ready” certifications • F5 BIG-IP, ARX and FP Virtual Edition appliances • vSphere, vCloud Director, View • Single Unified Namespace • iApp rapid solution deployment for View 4.6, 5.0 • vSphere 5.0 Metro-Distance Live Migration • Netapp FlexCache, EMC VPLEX
  • 4. © F5 Networks, Inc. Common Desktop Virtualization Challenges • User Experience • Performance over the Wide Area Network • Access methods / complexity • Login steps / annoyance • Security • Encryption of all WAN traffic • Unified Access (Local vs. Remote, Desktop vs. Smart Phone) • Integration with existing authentication infrastructure • Endpoint integrity inspection • Scalability/Availability • Ensuring total availability of connection servers, VMs • Single unified namespace across datacenters
  • 5. © F5 Networks, Inc. • VMware abstracts all hosts and and storage into “one big computer” • F5 connects users to applications running on vSphere F5 Networks: Application Delivery Networking
  • 6. © F5 Networks, Inc. Why Does Application Delivery Networking Matter for Virtualization Projects? Servers are more agile Storage is more agile Applications are more agile Clients are more agile Data centers are more agile What’s missing? The network!
  • 7. © F5 Networks, Inc. Taking A Step Back: What’s The Point? Application Delivery Networking F5 Networks
  • 8. © F5 Networks, Inc. Application Delivery Networking • Control point for all traffic inbound and outbound • Separate user connections from server connections • Dynamically apply appropriate policies Full Proxy
  • 9. © F5 Networks, Inc. Application Delivery Networking • Encrypt application and data in transit • User and Device authentication & authorization Security
  • 10. © F5 Networks, Inc. Application Delivery Networking • Caching • Protocol optimization Acceleration
  • 11. © F5 Networks, Inc. Application Delivery Networking • Load balancing • Persistence • Connection Multiplexing High Availability
  • 12. © F5 Networks, Inc. 4 Key Functions of Application Delivery Networking Scaling Migrating Protecting Managing
  • 13. © F5 Networks, Inc. Architecture
  • 14. © F5 Networks, Inc. Connection ServersConnection Servers BIG-IP LTM + APM Remote Clients Local LAN Clients Local Mode Desktop Primary Site Centralized Virtual Desktops Internet Encryption (DTLS or SSL) Unencrypted RDP or Natively Encrypted PCoIP) Security ServersSecurity Servers Secondary BIG-IP GTM
  • 15. © F5 Networks, Inc. User Experience
  • 16. © F5 Networks, Inc. Simplify Sign-On Frustrations Step 1 Local Login Step 2 VPN Login Step 3 Desktop Login SSO Login Once
  • 17. © F5 Networks, Inc. Traffic QoS View Desktops Rate Shape to ensure client-side View traffic receives priority over client-outbound outbound traffic Edge Client Edge Client Edge Client
  • 18. © F5 Networks, Inc. Security
  • 19. © F5 Networks, Inc. Unify Access to the Data Center DMZ Use existing user directories View Servers BIG-IP Edge Gateway • One solution to manage all access policies regardless of access network • Capacity and performance to secure all user traffic • Optimizes application delivery to remote and mobile users • Improves quality of real-time applications; soft phones and streaming media Mobile Users Wireless Users Internet Branch Office Users Internal LAN VLAN2 LAN Users Internal LAN VLAN1
  • 20. © F5 Networks, Inc. Unified AAA Services for View • Pre-Logon Checks: • OS, AV, firewall, process, file, registry, extended windows info, client and machine certs, etc. • Remediation: • Group Policy enforcement (Corp & Non-Corp Assets) • Protected Workspace • Intuitive, Visual Policy Editor
  • 21. © F5 Networks, Inc. Optimize Authentication & Authorization • Integration with existing authentication mechanisms • AD, LDAP, RADIUS, 2-Factor, Client Certs, Etc. • Support for PKI infrastructures • Extensible and scriptable • Comprehensive auditing/accounting • Check the device prior to logon • OS, AV, firewall, process, file, registry, 2-factor auth, client/machine certs, etc. • Remediate if necessary, automatically • Use protected workspaces for untrustworthy devices • Enforce Group Policies on all assets (even non-corporate assets) • Meets FIPS compliance requirements
  • 22. © F5 Networks, Inc. DMZ Stringent Corporate Security Policies View Security Server Running on Windows Server 2008 R2 BIG-IP APM FIPS Compliant Appliance Connection Server Connection Servers BIG-IP provides a high capacity, FIPS compliant alternative to the View Security Server Up to 2,000 concurrent users per server, 10,000 per pod. Up to 40,000 concurrent users on a single device
  • 23. © F5 Networks, Inc. Maintain Native PCoIP Performance Connection Brokers Mobile Users Remote Users Branch Office Users LAN Users DTLS Encryption View Servers DTLS Encryption SSL Encryption PCoIP PCoIP RDP DTLSEncryptionPCoIP Support for DTLS (UDP) encryption Support for SSL (TCP) encryption Avoids the alternative method of encapsulating UDP into TCP for SSL encryption (thus degrading UDP).
  • 24. © F5 Networks, Inc. Availability & Scalability in the Data Center
  • 25. © F5 Networks, Inc. Enable Scalability by Offloading Processes from View Connection Servers 1. Improve efficiency by offloading SSL 2. HA & load balancing for View Connection Servers Connection Servers
  • 26. © F5 Networks, Inc. Local Mode Acceleration BIG-IP Edge Gateway View pod BIG-IP Edge Gateway WAN Optimized Link Branch Office Datacenter Local Mode Check-out Check-in Synch
  • 27. © F5 Networks, Inc. DMZ Ubiquitous View Client Support for Large Deployments View Security Server BIG-IP LTM FIPS Compliant Appliance Connection Servers BIG-IP allows thick, thin, and zero clients access to View deployments, which are > 2000 users
  • 28. © F5 Networks, Inc. DMZ Maximum Scalability for View BIG-IP APM BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager Pod 2 Pod 1 DMZ BIG-IP APM BIG-IP Local Traffic Manager Pod 3 Max 10,000 users Per Cluster Global Load Balancing Among Multiple Sites Local Load Balancing >70,000 concurrent users @ 1Mbps each on a single device BIG-IP enables you to make multiple sites and multiple clusters, look like one big cohesive unit
  • 29. © F5 Networks, Inc. • iApps: Rapid, tested, streamlined, best practice deployment  iApp for VMware View 5.0  Deploy F5 LTM and APM in a matter of minutes  Provide best practice configuration  Avoid human error F5 iApps: Rapid Deployment for Enterprise Applications
  • 30. © F5 Networks, Inc. • Rapid, tested, streamlined, best practice deployment of F5 functionality for VMware View environments F5 iApp for VMware View
  • 31. © F5 Networks, Inc. Summary – VMware View & F5 • Improve and streamline User Experience • Integrate, simplify, and unify Security • Scale and provide global High Availability • Reduce OPEX and CAPEX Flexible deployment architectures and product Platforms to support any size enterprise View deployment
  • 32. © F5 Networks, Inc. Thank You F5 Networks www.f5.com/vmware