F5互联网出口解决方案

上传人:dja****22 文档编号:242968840 上传时间:2024-09-13 格式:PPT 页数:35 大小:331.50KB
返回 下载 相关 举报
F5互联网出口解决方案_第1页
第1页 / 共35页
F5互联网出口解决方案_第2页
第2页 / 共35页
F5互联网出口解决方案_第3页
第3页 / 共35页
点击查看更多>>
资源描述
Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,F5 互联网出口解决方案,Charles Zhu,2016.11.23,1,出向或入向流量不能选择最优的运营商链路,影响互联网访问效率?,不能对多条运营商链路实现完善的健康检查和故障切换?,为解决互联网出口安全问题而部署了多台不同功能的设备,维护人员无法应对?,后期希望实现互联网发布业务在同城双中心平滑切换的应用级容灾?,用户面临的业务问题,2,F5,的解决方案,电信,联通,移动,互联网,接入区,应用服务器群组,应用服务区域,Switch,Switch,Clients,F5 BIG-IP,标准版,解决方案说明:,GTM+LTM,结合,完美解决进站出站流量负载、多链路接入问题,智能聚合多条运营商链路,同时为业务级容灾,(双活),数据中心预留空间;,GTM,提供,DNSSEC,功能,,确保,DNS,来源的真实性与完整性,保障用户,DNS,系统安全;,DNS Service,为用户提供最大超过,8M QPS,的高性能,DNS,系统,并可有效防御,DNS DDoS,攻击;,LTM,设备确保大量并发业务系统的安全、快速和高可用性,解决大流量并发处理问题;,AFM,网络防火,墙为,IDC,提供,3-4,层网络,安全防护;,TMOS,融合了可定制的,iRules,和,UIE,,为处理应用访问或流程中的应用流量提供了强大的控制力;,AVR,模块提供,WEB,应用性能检测、监控;,自带,SSL VPN,模块帮助用户在任何地点安全快速地接入内网,实现对设备的远程管理;,提供高性能的硬件体系架构,满足用户性能和功能的按需扩展需,求;,简化整个数据中心多层架构,减少故障点及设备运维管理成本。,3,让用户可智能选择最优链路访问,Internet,资源,实现多条运营商链路高可用;,确保用户在互联网发布的业务系统能够被安全快速地访问;,为用户提供可控的外网,DNS,服务,并可有效防范针对,DNS,的,DDOS,攻击(*);,可提供,2-4,层网络防火墙安全防护和,L3-L4 DDOS,防护功能(*);,可为用户打造应用级容灾的双活数据中心(*);,多种功能融合在一个平台上实现,简化了数据中心架构,降低了,IT,投入成本(*),注:* 标识功能需扩展至标准版。,推荐解决方案,: 低配 LC2000S * 2 ; 高配 - BR4000S * 2,方案优势,4,使用,F5 Synthesis,新融合架构,在一台设备上实现客户的,L4-L7,的需求,降低了,30%,管理运维任务,实现了企业互联网出口多链路出向与入向的智能流量管理,保证了互联网出口,7*24,的连续性;,完善的,DDOS,安全防护架构,对恶意攻击起到了很好的防护,减少,70%,的外部攻击;,为用户未来扩展为双活数据中心提供了保障。,方案优势,5,主要技术:,多链路负载均衡,外网智能,DNS,及安全防护,应用双活,L3-L4,DDOS,防护,数据中心防火墙,核心业务:,电子商务平台,CMSEPS,系统,电子邮件系统,产销管理系统,设备部署:,BR-4000s,*,2,用户需求:,业务创新,从传统商务模式向,O2O,服务模式转变,建立高可用,具备高并发处理能力的电子商务平台,有能力防护,L3-L4,层的,DDoS,攻击,确保用户的访问体验,成功案例,xx,企业电子商务平台互联网出口解决方案,解决方案优势:,GTM+LTM,结合,完美解决进站出站流量负载、多链路接入问题,智能聚合多条运营商链路,同时为业务级容灾数据中心预留,空间,GTM,提供完善的,DNS,服务,提供智能的,DNS,解析功能,LTM,设备确保大量并发业务系统的安全、快速和高可用性,解决大流量并发处理问,题,AFM,数据中心防火墙,可,部署,1-4,层网络安,全,策略,,,实现,了安,全边界隔,离,并提供了,L3-L4,的,DDOS,攻,击防护,高,性能的体系架构,支,撑,数,据中心业,务的处理能力;满足用户性能和功能的按需扩展需求,TMOS,融合了可定制的,iRules,和,UIE,,为处,理访问中,的应用流量提供了强大的控制,力,APM,提供安全便捷的远程,SSL VPN,接入,方便远程进行数据中心维护管理,客户收益:,通,过,F5,BR-4000S,的部署,使,用,F5 Synthesis,新融合架构,在一台设备上完成客户的,L4-L7,服务的需求,大,大降低了管理的复杂,度,实现了企业各种核心业务系统应用的高可用,提升了,DNS,基础架,构的性能和其安全防护能力,完,善,的,DDOS,安全防护架,构,对恶意攻击起到了很好的防护,减少,70%,的外部攻,击,6,帮助用户解决互联网出口多链路问题,杜绝链路单点故障,消除多运营商链路间的瓶颈。,还可为用户在互联网出口实现外网,DNS,、应用级容灾和,L3-L4 DDOS,防护等服务。,业务价值,7,为什么选择,F5,8,欢迎关注,F5,微信公众号,9,Charts and Graphs,The following slides are examples of how to present statistics and data in visual formats.,10,Line graphs,Lorem ipsum dolor sit amet, nibh et consectetur lorem ipsum dolor sit amet, nibh et consectetur.,Lorem ipsum dolor sit amet, nibh et. Consectetur lorem ipsum dolor sit amet, nibh et consectetur Lorem,2013 PROJECTIONS,Two- to three-line summary of findings. Further detail in the right hand column below.,11,Lorem ipsum dolor sit amet, nibh lorem et consectetur lorem ipsum dolor,Lorem ipsum dolor sit amet, nibh lorem et consectetur lorem ipsum dolor,Lorem ipsum dolor sit amet, nibh lorem et consectetur lorem ipsum dolor,Lorem ipsum dolor sit amet, nibh lorem et consectetur lorem ipsum dolor,9%,10%,58%,23%,Pie Chart,Two- to three-line summary of findings. Further details in the right hand column below.,12,Two- to three-line summary of findings.,$XXXM,Projected income for the first 3 months of 2013,$X million,Sept 12, 2013,Bar charts,$XXXM,Projected income for the first 3 months of 2013,$XXXM,Projected income for the first 3 months of 2013,13,Doughnut charts,You can double-click on these charts to open in Excel and change the data there.,SUBJECT: 400,000,SUBJECT: 400,000,50,%,74,%,82,%,95,%,SUBJECT: 400,000,SUBJECT: 400,000,Heres another option for percentage-based information. Three to four max per slide.,14,Icons and Diagrams,For your convenience, weve incorporated common icons into the F5 corporate template using a sample diagram. These have been converted to PowerPoint objects. You can change them to white if you need to use them against a color background. If you scale the size of an object, you must resize the text separately.,15,Next-Generation Firewall,Users leverage NGFW foroutbound protection,Employees,Can inspect SSL at either tier,Customers,DDoS Attack,Partners,DDoS Attack,ISP providesvolumetric DDoSservice,Cloud,Scrubbing Service,GOOD,BETTER,BEST,Simplified Business Models,+ IP Intelligence,BIG-IP Advanced Firewall Manager,BIG-IP Local Traffic Manager,BIG-IP Global Traffic Manager,BIG-IP Access Policy Manager,BIG-IP Application Security Manager,Diagram example with licensing,ISPa,ISPb,Network Firewall Services,+ DNS Services,+ Simple Load Balancing to Tier 2,BIG-IP Platform,+ IP Intelligence(IPI) Module,BIG-IP Platform,Web Application Firewall Services,+ SSL Termination,Tier 2: Protecting L7,Tier 1: Protecting L34 and DNS,16,F5 software,BIG-IP Local Traffic Manager,BIG-IP Global Traffic Manager,BIG-IP Application Acceleration Manager,BIG-IP Advanced Firewall Manager,BIG-IP Access Policy Manager,BIG-IP Application Security Manager,BIG-IP Edge Client,BIG-IP Carrier-Grade NAT,BIG-IP Policy Enforcement Manager,Signaling Delivery Controller,OpenBlox,Mobile App Manager,BIG-IQ,BIG-IQ Security,BIG-IQ Cloud,BIG-IQCloud,Virtual Editions,BIG-IQSecurity,BIG-IPLocal TrafficManager,BIG-IPGlobal TrafficManager,Application Examples,Name of Solution,Functionality,or Feature Here,LTM,APM,ASM,SDC,MAM,BIG-IP Local Traffic Manager,BIG-IP Access Policy Manager,BIG-IP Application Security Manager,Signaling Delivery Controller,Mobile App Manager,Data Center,Signaling DeliveryController,Mobile AppManager,17,F5 product representation,VIPRION Platform,BIG-IP Platform,BIG-IP Virtual Edition,Form factor not required,Form and platform name needed, but not specific model number,To represent F5 or third-party hardware, you can choose from the three options below. When deciding which to use, consider how much information your audience needs.,VIPRION Platform,VIPRION Platform,BIG-IP Platform,18,F5 product representationoptions,Load BalancingDDoS ProtectionFirewall,Internet,Internet,VIPRION Platform,Load BalancingDDoS ProtectionFirewall,LTM,APM,ASM,BIG-IP Local Traffic Manager,BIG-IP Access Policy Manager,BIG-IP Application Security Manager,Devices,Data Center,Devices,Data Center,19,Hardware user devices,Desktop,Laptop,Phone,Tablet,Desktop,Laptop,Smartphone,Tablet,DesktopE-Commerce,InfectedLaptop,WithAuthentication,Tablet withApps,DesktopReporting,MobileHotspot,MobileHotspot,Passcode,Tablet withCollaboration,MobileHotspot,20,Hardware user devicesoptions,Clustered Groupings,Horizontal Groupings,Vertical Groupings,Devices,Devices,Devices,Mobile,Devices,Mobile Devices,Mobile Devices,21,Server,Servers,Servers,Servers,Server,ClassicServer,BladeServer,ServerRack,Storage,Database,Data,PublicCloud,Private/PublicCloud,HybridCloud,PrivateCloud,Internet,WAN,Router,Switch,ADC,Firewall,Network hardware,22,Service provider-specific,Support Nodes,PE,MME,SGSN,Policies or Functions,Control Nodes,Databases,Alternate,Routers,PCRF,HSS,GGSN/PGW,v-PCRF,SGW,h-PCRF,PGW,OCS,GGSN/PGW/ASNGW,SIP AS,IGR,Active Directory,DEA,Roaming Hub,Access Node,Networks and Protocols,Diameter,DSL,Cable,FTTH,Gb,Gi,Gn,GTP,Gx/Sd,Gy,Gz,HTTP,LDAP,Logging Mirror,Access,lu-PS,MAP,OpenStack API,RADIUS,Rx,S1,S11,S6a,S8,S9,SGi,SIP,SOAP,SS7,SSL,XML,x-CSCF,network,Adjustable blank box for alternate abbreviations,23,Virtual instances,General Hypervisor,Hypervisor,Virtual,Applications,Hypervisor,Virtual,Applications,The Hypervisor label is used for generic hypervisors, to be more specific replace the label with a brand name product:,Virtual,Applications,Hypervisor,Virtual,Applications,Hypervisor,Virtual,Applications,Hypervisor,Virtual,Applications,Hypervisor,Virtual,Applications,Hypervisor,Hyper-V,KVM,vSphere,Xen,24,Industries,Finance,Finance,Finance,Finance,Manufacturing,Retail,Media,Publishing,E-Commerce,Solar,Healthcare,Automotive,Government,Education,25,alternates,Customer challenges,Explosive Data Growth,Rising Security Threats/Attacks,New Network,Innovations,Network,Virtualization,Hacktivism,Higher Cost,Structure/,Lower Margins,Higher Cost,Structure/,Lower Margins,Higher Cost,Structure/,Lower Margins,Higher Cost,Structure/,Lower Margins,Malware,High Network Complexity,Low Customer,Satisfaction,Long time to deploynew services,Lower Network,Quality,State Sponsored,Attacks,Difficult to ManageLots of Boxes,Network Availability,Signaling storms,26,Customer benefits,Massive Scalabilityand Capacity,Full-Proxy,Architecture for,Visibility and Control,Extensibility,Unified Framework andManagement,Simpler,Architecture/Network,DNS,Dynamic,Multi-Layered,Security,SSL,NFV-Ready,Flexibility,27,Technologies,Storage,Tiering,Global Load Balancing,Data Migration,Data,Backup,DDoS,Protection,DNSSEC,Application,Security,Data Center,Firewall,Access,Security,Local Load Balancing,Cloud,Security and Access,Cloud,Storage,Cloud,Provisioning,BYOD,SSLVPN,Security,Securing,Exchangeand SharePoint,28,General,Document,Cached,Document,Log,Data Packet,Cached,Data,Packet,Email,Spam,Data/Communications,Video,Camera,POS,Media,PerformanceDial, low,PerformanceDial, medium,PerformanceDial, high,PerformanceLevels,Data Center,Headquarters,Branch,Geolocation,Home,Place/Location,Cloud Hosted App,Physical Hosted App,Cloud Hosted Apps,Folder,29,Attackers,General,Attacker,Web Bot,Shield,ID Tag,Authentication,Provisioning,DDoSProtection,DataMigration,Tiering,WANOptimization,Local LoadBalancing,Global Load Balancing,Link Load Balancing,User,User 2,Admin,Unidentified User,Security,Technologysolutions,Users/Admin,Alternative,User,Alternative,User,30,General,Wireless,Other,TransmissionTower,WiFi,Satellite,SatelliteDish,Doorway,TrafficLight,Support,CallCenter,Visibility and Control,Infrastructure,Quote,Search Inspection,VirtualServer,Virtual Private,Network,Calendar,Website,App,Apps,Generic Industry Apps,31,Small icons,Unsecure,More information and details.,Even more information and details.,And even more information and details. Always center text to bracket.,Secure,No Entry,Approved,NotApproved,Certified,Tokenized,Place these small icons directly on top of connecting lines,to help tell the story. In general, these icons dont need labels.,Use these small icons can be placed on larger icons to change their state.,Use the bracket and smaller text box to describe whats going on in more detail.,32,Containers,Data Center,Data Center,Data Center,Example of a nested box that uses a thinner line,Network Firewall Services,+ DNS Services,+ Simple Load Balancing to Tier 2,BIG-IP Platform,Data Center,33,DDoS Protection,S/Gi Network Simplification,Security for Service Providers,Application Services,Migration,to Cloud,DevOps,LTE,Roaming,DNS,Cloud Federation,Cloud,Bursting,NFV,VDI,High-Performance IPS,Web Fraud Protection,Secure Web Gateway,Reference Architecture Icons (March 2013),34,Next Steps,This is an optional ending slide to the logo only slide,List three key items that you want people to take away from your presentation,Keep these items brief and on point.,If I can be of further assistance please contact me:,J. | 206.272.5555,35,
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 图纸专区 > 大学资料


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!