F5互联网出口解决方案ppt课件.pptx

上传人:牧羊曲112 文档编号:1376166 上传时间:2022-11-16 格式:PPTX 页数:37 大小:1.86MB
返回 下载 相关 举报
F5互联网出口解决方案ppt课件.pptx_第1页
第1页 / 共37页
F5互联网出口解决方案ppt课件.pptx_第2页
第2页 / 共37页
F5互联网出口解决方案ppt课件.pptx_第3页
第3页 / 共37页
F5互联网出口解决方案ppt课件.pptx_第4页
第4页 / 共37页
F5互联网出口解决方案ppt课件.pptx_第5页
第5页 / 共37页
点击查看更多>>
资源描述

《F5互联网出口解决方案ppt课件.pptx》由会员分享,可在线阅读,更多相关《F5互联网出口解决方案ppt课件.pptx(37页珍藏版)》请在三一办公上搜索。

1、F5 互联网出口解决方案,Charles Zhu2016.11.23,出向或入向流量不能选择最优的运营商链路,影响互联网访问效率?不能对多条运营商链路实现完善的健康检查和故障切换?为解决互联网出口安全问题而部署了多台不同功能的设备,维护人员无法应对?后期希望实现互联网发布业务在同城双中心平滑切换的应用级容灾?,用户面临的业务问题,F5的解决方案,电信,联通,移动,互联网接入区,应用服务器群组,解决方案说明:GTM+LTM结合,完美解决进站出站流量负载、多链路接入问题,智能聚合多条运营商链路,同时为业务级容灾(双活)数据中心预留空间;GTM提供DNSSEC功能,确保DNS来源的真实性与完整性,保

2、障用户DNS系统安全;DNS Service为用户提供最大超过8M QPS的高性能DNS系统,并可有效防御DNS DDoS攻击;LTM设备确保大量并发业务系统的安全、快速和高可用性,解决大流量并发处理问题;AFM网络防火墙为IDC提供3-4层网络安全防护;TMOS融合了可定制的iRules和UIE,为处理应用访问或流程中的应用流量提供了强大的控制力;AVR模块提供WEB应用性能检测、监控;自带 SSL VPN模块帮助用户在任何地点安全快速地接入内网,实现对设备的远程管理;提供高性能的硬件体系架构,满足用户性能和功能的按需扩展需求;简化整个数据中心多层架构,减少故障点及设备运维管理成本。,让用户

3、可智能选择最优链路访问Internet资源,实现多条运营商链路高可用;确保用户在互联网发布的业务系统能够被安全快速地访问;为用户提供可控的外网DNS服务,并可有效防范针对DNS的DDOS攻击(*);可提供2-4层网络防火墙安全防护和L3-L4 DDOS防护功能(*);可为用户打造应用级容灾的双活数据中心(*);多种功能融合在一个平台上实现,简化了数据中心架构,降低了IT投入成本(*) 注:* 标识功能需扩展至标准版。 推荐解决方案: 低配 LC2000S * 2 ; 高配 - BR4000S * 2,方案优势,使用F5 Synthesis新融合架构,在一台设备上实现客户的L4-L7的需求,降低

4、了30%管理运维任务实现了企业互联网出口多链路出向与入向的智能流量管理,保证了互联网出口7*24的连续性;完善的DDOS安全防护架构,对恶意攻击起到了很好的防护,减少70%的外部攻击;为用户未来扩展为双活数据中心提供了保障。,方案优势,主要技术:多链路负载均衡外网智能DNS及安全防护应用双活L3-L4 DDOS防护数据中心防火墙,核心业务:电子商务平台CMSEPS系统电子邮件系统产销管理系统,设备部署:BR-4000s * 2,用户需求:业务创新,从传统商务模式向O2O服务模式转变建立高可用,具备高并发处理能力的电子商务平台有能力防护L3-L4层的DDoS攻击确保用户的访问体验,成功案例xx企

5、业电子商务平台互联网出口解决方案,解决方案优势:GTM+LTM结合,完美解决进站出站流量负载、多链路接入问题,智能聚合多条运营商链路,同时为业务级容灾数据中心预留空间GTM提供完善的DNS服务,提供智能的DNS解析功能LTM设备确保大量并发业务系统的安全、快速和高可用性,解决大流量并发处理问题AFM数据中心防火墙可部署1-4层网络安全策略,实现了安全边界隔离,并提供了L3-L4的DDOS攻击防护高性能的体系架构,支撑数据中心业务的处理能力;满足用户性能和功能的按需扩展需求TMOS融合了可定制的iRules和UIE,为处理访问中的应用流量提供了强大的控制力APM提供安全便捷的远程SSL VPN接

6、入,方便远程进行数据中心维护管理客户收益:通过F5 BR-4000S的部署,使用F5 Synthesis新融合架构,在一台设备上完成客户的L4-L7服务的需求,大大降低了管理的复杂度实现了企业各种核心业务系统应用的高可用提升了 DNS 基础架构的性能和其安全防护能力完善的DDOS安全防护架构,对恶意攻击起到了很好的防护,减少70%的外部攻击,帮助用户解决互联网出口多链路问题,杜绝链路单点故障,消除多运营商链路间的瓶颈。还可为用户在互联网出口实现外网DNS、应用级容灾和L3-L4 DDOS防护等服务。,业务价值,为什么选择F5,欢迎关注F5微信公众号,Charts and Graphs,The

7、following slides are examples of how to present statistics and data in visual formats.,Line graphs,Lorem ipsum dolor sit amet, nibh et consectetur lorem ipsum dolor sit amet, nibh et consectetur.Lorem ipsum dolor sit amet, nibh et. Consectetur lorem ipsum dolor sit amet, nibh et consectetur Lorem,20

8、13 PROJECTIONS,Two- to three-line summary of findings. Further detail in the right hand column below.,Lorem ipsum dolor sit amet, nibh lorem et consectetur lorem ipsum dolor,Lorem ipsum dolor sit amet, nibh lorem et consectetur lorem ipsum dolor,Lorem ipsum dolor sit amet, nibh lorem et consectetur

9、lorem ipsum dolor,Lorem ipsum dolor sit amet, nibh lorem et consectetur lorem ipsum dolor,9%,10%,58%,23%,Pie Chart,Two- to three-line summary of findings. Further details in the right hand column below.,Two- to three-line summary of findings.,$XXXM,Projected income for the first 3 months of 2013,$X

10、millionSept 12, 2013,Bar charts,$XXXM,Projected income for the first 3 months of 2013,$XXXM,Projected income for the first 3 months of 2013,Doughnut charts,You can double-click on these charts to open in Excel and change the data there.,SUBJECT: 400,000,SUBJECT: 400,000,50%,74%,82%,95%,SUBJECT: 400,

11、000,SUBJECT: 400,000,Heres another option for percentage-based information. Three to four max per slide.,Icons and Diagrams,For your convenience, weve incorporated common icons into the F5 corporate template using a sample diagram. These have been converted to PowerPoint objects. You can change them

12、 to white if you need to use them against a color background. If you scale the size of an object, you must resize the text separately.,Users leverage NGFW foroutbound protection,Can inspect SSL at either tier,ISP providesvolumetric DDoSservice,Diagram example with licensing,Network Firewall Services

13、 + DNS Services + Simple Load Balancing to Tier 2,BIG-IP Platform,+ IP Intelligence(IPI) Module,Tier 1: Protecting L34 and DNS,F5 software,BIG-IP Local Traffic Manager,BIG-IP Global Traffic Manager,BIG-IP Application Acceleration Manager,BIG-IP Advanced Firewall Manager,BIG-IP Access Policy Manager,

14、BIG-IP Application Security Manager,BIG-IP Edge Client,BIG-IP Carrier-Grade NAT,BIG-IP Policy Enforcement Manager,Signaling Delivery Controller,OpenBlox,Mobile App Manager,BIG-IQ,BIG-IQ Security,BIG-IQ Cloud,Virtual Editions,Application Examples,F5 product representation,Form factor not required,For

15、m and platform name needed, but not specific model number,To represent F5 or third-party hardware, you can choose from the three options below. When deciding which to use, consider how much information your audience needs.,VIPRION Platform,BIG-IP Platform,F5 product representationoptions,Load Balanc

16、ingDDoS ProtectionFirewall,Internet,Internet,VIPRION Platform,Load BalancingDDoS ProtectionFirewall,LTM,APM,ASM,BIG-IP Local Traffic ManagerBIG-IP Access Policy ManagerBIG-IP Application Security Manager,Devices,Data Center,Devices,Data Center,Hardware user devices,Desktop,Laptop,Phone,Tablet,Hardwa

17、re user devicesoptions,Clustered Groupings,Horizontal Groupings,Vertical Groupings,Network hardware,Service provider-specific,Support Nodes,Policies or Functions,Control Nodes,Databases,Alternate Routers,Networks and Protocols,Adjustable blank box for alternate abbreviations,Virtual instances,Genera

18、l Hypervisor,Hyper-VKVMvSphereXen,Industries,alternates,Customer challenges,Customer benefits,Technologies,General,Data/Communications,Media,PerformanceDial, low,PerformanceDial, medium,PerformanceDial, high,PerformanceLevels,Place/Location,General,Security,Technologysolutions,Users/Admin,General,Wi

19、reless,Other,Quote,Search Inspection,Calendar,Generic Industry Apps,Small icons,Unsecure,More information and details.,Even more information and details.,And even more information and details. Always center text to bracket.,Secure,No Entry,Approved,NotApproved,Certified,Tokenized,Place these small i

20、cons directly on top of connecting lines to help tell the story. In general, these icons dont need labels.,Use these small icons can be placed on larger icons to change their state.,Use the bracket and smaller text box to describe whats going on in more detail.,Containers,Data Center,Data Center,Dat

21、a Center,Example of a nested box that uses a thinner line,Network Firewall Services + DNS Services + Simple Load Balancing to Tier 2,BIG-IP Platform,Data Center,DDoS Protection,S/Gi Network Simplification,Security for Service Providers,Application Services,Migration to Cloud,DevOps,LTE Roaming,DNS,C

22、loud Federation,CloudBursting,NFV,VDI,High-Performance IPS,Web Fraud Protection,Secure Web Gateway,Reference Architecture Icons (March 2013),Next Steps,This is an optional ending slide to the logo only slideList three key items that you want people to take away from your presentationKeep these items brief and on point.,If I can be of further assistance please contact me:J | 206.272.5555,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 生活休闲 > 在线阅读


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号