410 likes | 574 Views
How to achieve a fast, secure and available virtualization infrastructure. Luuk Dries. Why virtualization – a small recap. Efficiency Maximize CPU, RAM and Disk resources Energy savings Flexibility Quick response to business needs Quickly adding and removing applications.
E N D
How to achieve a fast, secure and available virtualization infrastructure Luuk Dries
Why virtualization – a small recap • Efficiency • Maximize CPU, RAM and Disk resources • Energy savings • Flexibility • Quick response to business needs • Quickly adding and removing applications
Why virtualization ? • Business Continuity • Disaster Recovery • Security • Test and Development
Each Application has its own specific requirements: 99,999% Availability, Performance over the WAN, High Security, .... Applications Application Delivery Networking SharePoint Database Siebel BEA.NET SAP PeopleSoft IBM ERP SalesForce Custom Available Secure Fast
Availability for the Web Tier… 99% 99% 99% 99.99% Internet 99.9999% 99% • Unmatched scalability and transparency • High Availability and Load Balancing • Centralized SSL offloading
… and for the Application Tier Application WWW 99% 99% 99% 99% Internet 99% 99% • Full L7 application visibility • L7 content processing and switching • Application monitoring 98% 99% Accumulated Availability
Flexibility:DataCenter Automation • Real-time interfacing with vCenter to add new VMs to the load balancing pool (iControl) • Advanced Health Checks to ensure that newly provisioned VMs are ready for traffic
ISP1 Availability and Performance across ISP Links • Select link on: • Availability • Cost of route • Protocol • Source/Destination • Time • And apply: • - Bandwith • Management • - Traffic Prioritization Internet ISP2
Availability and Performance across Datacenters Local DNS Internet Backup DC Primary DC
Difficult to accelerate SSL content • First time visits are slow • Network latency, packet loss, verbose protocols • Dynamic Web content • Users are increasingly remote and/or mobile • Data center consolidation • = My Web Applications are Slow.. IT Manager & App Architect
WAN Latency WAN Latency WAN Latency WAN Latency Chatty Apps & Latency = Slow Apps Web Browser MyWebApp.com Web Servers Get / HTTP/1.1 250 ms Time Index.html Get /javascript.js HTTP/1.1 250 ms javascript.js Get /stylesheet.css HTTP/1.1 250 ms stylesheet.css Get /image(n).jpg HTTP/1.1 250 ms image(n).jpg A web page load with about 100 objects generates at least 100 round-trips WAN: 100/2 x 250 ms = 12.5 seconds! LAN: 100/2 x 1 ms = 50 ms
Impact of Web Acceleration With Without
F5 Approach – Three Tiers of Acceleration • Tier 1 Acceleration – Network Offload • Re-use downloaded objects/content (IBR) • Reduce data transferred (Compression) • Tier 2 Acceleration – Server Offload • Servers are busy serving same data over and over (Caching) • Too many connections to back-end servers (OneConnect & spooling) • Overflow of connections to back-end servers (RateShape & conn limit) • SSL offload • Compression offload • Tier 3 Acceleration – Application Offload • Browser re-downloads same content over and over (IBR) • Force multiple connections (MultiConnect) • Web apps are slow over the WAN (ESI, Compression, PDF linear..)
Effect of 3 Tiers of AccelerationPage Load Time Up to 90% reduction in Page load time
Effect of 3 Tiers of AccelerationCPU Utilization Up to 90% reduction in CPU utilization
Intelligent Browser Referencing This is the onlydynamic content Problem • Repeated Content Retrieval Slows Web Application • Dynamic pages contain mostly static content that is retrieved repeatedly
Intelligent Browser Referencing Initial Request Cache Compression Subsequent Client Requests Cache Apply IBR cache expiration Repeat Visits Retrieve from Browser Cache Solution • WebAccelerator Enables Browser Re-use of Cacheable Contents • No client to download • No changes to browser
Validated in vendor application labs Certified policies pre-configured Easy to Deploy – Easy to Integrate
Web Acceleration Performance 2X to10X Performance Increase
F5 and VMware can enable a secure, live migration …of a virtualized application and its storage …from one siteto another …without downtimeandwithout user disruption.
Initial Environment BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B
Step 1: F5 BIG-IP Local Traffic Manager Opens WAN Optimization Tunnel BIG-IP Global Traffic Manager 1 BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager • Compressed • De-Duplicated • Encrypted vCenter A vCenter B
Step 2: Storage vMotion Executed Across WAN Optimized Tunnel BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B This step can be avoided if storage is already being synchronously replicated between sites 2
Step 2: Pending App vMotion, transactions rely on VM in Site A, but Storage in Site B BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B vCenter A still managing VM
Step 3: Application vMotion Executed Over WAN Optimized Tunnel BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B 3
Step 4: vCenter Instructs F5 BIG-IP Global Traffic Manager to Cut Over to Site-B BIG-IP Global Traffic Manager 4 BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B
F5 BIG-IP Global Traffic Manager Routes All NEW Application Connections/Sessions Directly to Site B. BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B
F5 BIG-IP Local Traffic Manager in Site A Redirects EXISTING Sessions Temporarily to Site B Until Clients Register DNS Change BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B
Eventually, ALL Connections Go Directly to Site B. The Process Can Be Reversed When Necessary. BIG-IP Global Traffic Manager BIG-IP Local Traffic Manager BIG-IP Local Traffic Manager vCenter A vCenter B • Successful Application • Migration • Complete
! Unauthorised Access Web Application Security ! Who is this?? Stops bad requests / responses Non-compliant Information WAF allows legitimate requests Browser ! ! Infrastructural Intelligence Unauthorised Access What is he doing ??
Challenges of Web Application Security • HTTP attacks are valid requests • HTTP is stateless, application is stateful • Web applications are unique • there are no signatures for YOUR web application • Good protection has to inspect the response as well • Encrypted traffic facilitates attacks… • Organizations are living in the dark • missing tools to expose/log/report HTTP(s) attacks
ASM: Powerful Adaptable Solution • Provides comprehensive protection for all web application vulnerabilities • Provides out of the box security • Logs and reports all application traffic • Provides L2->L7 protection • Unifies security and acceleration services • Stop attacks unseen by traditional WAFs (anti-evasion) • Provide On-Demand WAF scaling • Sees Application level performance
Layer 7 DoS and Brute Force Unique Attack Detection and Protection • Unwanted clients are remediated and desired clients are serviced • Improved application availability
Why F5? The F5 Advanced ADN Applications Application Delivery Networking SharePoint Database Siebel BEA.NET SAP PeopleSoft IBM ERP SalesForce Custom Available Secure Fast
Gartner Magic Quadrant for ADC challengers leaders F5 Networks • Offers the most feature-rich AP ADC, combined with excellent performanceand programmability via iRules and a broad product line. • Strong focus on applications, including long-term relationships with major application vendors, including Microsoft, Oracle and SAP. • Strong balance sheetand cohesive management team with a solid track record for delivering the right products at the right time. • Strong underlying platform allows easy extensibility to add features. • Support of an increasingly loyal and large group of active developerstuning their applications environments specifically with F5 infrastructure. F5 Networks Citrix Systems | ability to execute | Cisco Systems Radware Foundry Networks Zeus Technology Nortel Networks niche players visionaries | completeness of vision | Source: Gartner (July 2008)
BIG-IP Hardware Line-up VIPRION Price BIG-IP 8900 36 Gbps Traffic Multiple Product Modules Ultimate redundancy in a single chassis 2 x Quad core CPU 16 10/100/1000 or 2 10GE SFP+ 2x 320 GB HD + 8GB CF 16 GB memory SSL @ 58K TPS/ 9.6 Gb Bulk 8 Gbps max hardware compression 12 GbpsTraffic Multiple Product Modules BIG-IP 6900 2 x Dual core CPU 16 10/100/1000 + 8x 1GB SFP 2x 320 GB HD (S/W RAID) + 8GB CF 8 GB memory SSL @ 25K TPS/ 4 Gb bulk 5 Gbps max hardware compression 6 Gbps Traffic Multiple Product Modules BIG-IP 3600 BIG-IP 1600 Dual core CPU 8 10/100/1000 + 2x 1GB SFP 1x 160 GB HD + 8GB CF 4 GB memory SSL @ 10K TPS/2 Gb bulk 1 Gbps max software compression 1.5 Gbps Traffic 1 Advanced Product Module Dual core CPU 4 10/100/1000 + 2x 1GB SFP 1x 160GB HD 4 GB memorySSL @ 5K TPS/1 Gb Bulk 750 Mbps max software compression 750 M Traffic 1 Basic Product Module Function / Performance
F5’s Data Center Vision – Unified Application & Data Delivery Data Center & Link Virtualization: Services & Policy Web Server Virtualization: Services & Policy Application Server Virtualization: Services & Policy File Storage Virtualization: Services & Policy DC 1: U.S. Cell Link 1 Link 2 Link 3 PC - Home Web Server Web Server Web Server Web Server DC 2: U.K. Remote - WAN Link 1 Link 2 Link 3 App. Server App. Server App. Server App. Server PC - LAN WLAN Windows file storage Windows file storage EMC NetApp BIG-IP LTM, WA, ASM F5 ARX BIG-IP LTM, SAM BIG-IP LTM,GTM & LC
ARX – File Virtualization BEFORE AFTER • User / application access tightly coupled to physical file storage • Inflexible: change is disruptive • Complex: multiple mappings to heterogeneous storage devices • Inefficient: low aggregate utilization • File access decoupled from physical storage location • Flexible: change is non-disruptive • Simple: single mapping to unified storage pool • Efficient: maximize utilization
Tiering / ILM / Data Migration • Match cost of storage to business value of data • Files are automatically moved between tiers based on flexible criteria such as age, type, size, etc. • Drivers: • Storage cost savings, backup efficiencies, compliance • Benefits: • Reduced CAPEX • Reduced backup windows and infrastructure costs
Summary • F5 offersyou the scalabilityboth in performance and functionality to optimizeall your applications • F5 makesyour applications • SECURE • FAST • AVAILABLE in the most flexible and stable solution • F5 optimizesyourstorageenvironment