SlideShare a Scribd company logo
1 of 52
CONFIDENTIAL 
F5 Solutions for 
Service Providers 
Bart Salaets 
Solution Architect
Complex network architectures 
Value-added services (VAS) 
Video optimization Transparent caching URL filtering 
Static port80 based steering into VAS complex 
Internet 
DNS PCRF IMS AAA HSS OCS DRA 
RTR L2 Switch DPI/TDF FW RTR 
End 
Users 
Control Plane 
GGSN/PG CGNAT 
Challenges 
• Complex architecture, hard to 
scale 
• Resulting high CapEx and OpEx 
• Difficulty adding new services 
LDNS 
BRAS/BNG 
Multiple point product solutions inline in the data path 
W 
© F5 Networks, Inc CONFIDENTIAL 2
The new network should focus on … 
Optimize Monetize Secure 
Quality of Experience mgmt 
Flexible opt-in/opt-out services 
Flexible charging 
Intelligent steering to VAS 
Consolidate L4-L7 functions 
TCP Optimization 
Migrate to NFV-based solution 
Network Security (Gi FW) 
Dynamic subscriber security 
DNS Security 
IPv4/IPv6 Transition 
© F5 Networks, Inc CONFIDENTIAL 3
A Consolidated Approach with F5 
Simplifying the delivery of L4-L7 network services 
BEFORE F5 
WITH F5 
VAS layer 
LDNS Policy 
URL 
CGNAT Internet 
Static port 80 steering 
RTR 
PGW/ Firewall 
BNG 
PGW/ 
BNG 
Enforcement 
Internet 
Filtering 
VAS layer 
Dynamic & intelligent steering 
VIPRION 
© F5 Networks, Inc CONFIDENTIAL 4
Consolidate L4-L7 Network Functions with F5 
L2 switching 
MPLS L2 PE 
L3 routing 
MPLS L3 PE 
BRAS/BNG 
2005–2010 L2–L3 L4–L7 2010–2014 
Full Proxy 
(TCP opt, 
HHE) 
Firewall 
L3/L4 
Steering 
Policy 
Enforcement 
CGNAT 
TCP OPTIM 
DPI/PCEF 
L7 STEERING 
FW/CGN 
HTTP HE 
Multi-service 
router 
IP ROUTING 
MPLS L2 PE 
MPLS L3 PE 
BRAS/BNG 
Dedicated platforms, 
different vendors 
Single platform, 
L2–L3 consolidation 
Dedicated platforms, 
different vendors 
Unified platform, 
L4–L7 consolidation 
© F5 Networks, Inc CONFIDENTIAL 5
Purpose Built Platforms for L4-L7 Services 
10,000,000 
9,000,000 
8,000,000 
7,000,000 
6,000,000 
5,000,000 
4,000,000 
3,000,000 
2,000,000 
1,000,000 
0 
BIG-IP 11050 
2.5M L7 RPS 
1M L4 CPS 
40/42G L7/L4 TPUT 
BIG-IP 4200v 
850k L7 RPS 
300K L4 CPS 
10G L7/L4 TPUT 
VIPRION 
2400 
8M L7 RPS 
4M L4 CPS 
320G L7/L4 
TPUT 
VIPRION 
4480 
10M L7 RPS 
5.6M L4 CPS 
160/320G L7/L4 
TPUT 
BIG-IP 10200v 
2M L7 RPS 
1M L4 CPS 
40/80G L7/L4 TPUT 
BIG-IP 2200s 
425K L7 RPS 
150K L4 CPS 
5G L7/L4 TPUT 
BIG-IP 5200v 
1.5M L7 RPS 
700K L4 CPS 
15/30G L7/L4 TPUT 
BIG-IP 7200v 
1.6M L7 RPS 
775K L4 CPS 
20/40G L7/L4 TPUT 
BIG-IP Virtual Edition 
Up to 325K L7 RPS 
Up to 100K L4 CPS 
10G L7/L4 TPUT 
VIPRION 2200 
4M L7 RPS 
2M L4 CPS 
160G L7/L4 TPUT 
VIPRION 
4800 
20M L7 RPS 
10M L4 CPS 
320/640G 
L7/L4TPUT 
BIG-IP Virtual EditionBIG-IP 2000 Series BIG-IP 4000 Series BIG-IP 5000 Series BIG-IP 7000 SeriesBIG-IP 10000 SeriesBIG-IP 11000 Series VIPRION 2200 VIPRION 2400 VIPRION 4480 VIPRION 4800 
L7 Requests Per Second (Inf-Inf) 
© F5 Networks, Inc CONFIDENTIAL 6
BIG-IQ 
Cloud™ 
BIG-IP® 
Advanced 
Firewall 
Manager 
(AFM) 
BIG-IP / BIG-IQ – Technology Suite 
BIG-IQ 
Device™ 
BIG-IQ Platform™ 
BIG-IP® 
Applicatio 
n 
Security 
Manager 
(ASM) 
BIG-IQ 
Security™ 
BIG-IP® 
DNS 
Modules 
(GTM) 
BIG-IP® 
Local 
Traffic 
Manager 
(LTM) 
BIG-IP® 
Carrier 
Grade NAT 
(CGNAT) 
BIG-IP® 
Policy Enf. 
Manager 
(PEM) 
BIG-IP® 
Access 
Policy 
Manager 
(APM) 
Plugin 
Eco 
Syste 
m 
VMWare 
Cisco 
APIC 
Microsoft 
SCVMM 
OpenStack 
AWS 
Open 
Connector 
ADC 
Service Provider 
Security 
Cloud 
Orchestration 
BIG-IQ 
ADC 
BIG-IQ 
MAM 
BIG-IP® 
Acceleratio 
n 
Manager 
(AM) 
MobileSaf 
e 
and 
WebSafe 
(Versafe) 
iRules®, iApps®, iCall, iStats and iControl® 
Manageability RBAC, Logging, SNMP, CLI, GUI 
L3/Routing, UDP, IP, IPSec, IPv6, SCTP, TCP, HTTP, SSL, 
FIPS, Tunneling, BWC, Stats, Certifications 
CMP, VCMP, ScaleN, Firmware, HAL, Sizing Guides 
KVM / AWS / Xen 
VMWare / HyperV 
Programmability 
Core Protocols 
Performance / Scalability 
TMOS 
Operating System 
Appliances 
Chassis Software 
TMOS 
Fabric 
© F5 Networks, Inc CONFIDENTIAL 7
Key F5 network services – Optimize, Monetize, Secure 
A unified platform and single management framework 
Intelligent Traffic 
Steering 
Per-Subscriber 
Policy Enforcement 
CGNAT and 
IPv6 Migration 
URL Filtering 
ICSA Certified 
Network Firewall 
TCP 
Local 
DNS 
Optimization 
DPI & 
© F5 Networks, Inc CONFIDENTIAL 8
Key F5 network services – Optimize, Monetize, Secure 
A unified platform and single management framework 
Intelligent Traffic 
Steering 
Per-Subscriber 
Policy Enforcement 
CGNAT and 
IPv6 Migration 
URL Filtering 
ICSA Certified 
Network Firewall 
TCP 
Local 
DNS 
Optimization 
DPI & 
© F5 Networks, Inc CONFIDENTIAL 9
Policy Enforcement Manager – Policy Definition 
Policy Name Bronze 
Policy Name Silver 
Policy Name Gold 
PREC 10 CLASSIFIER RULE_10 POLICY ACTION RULE_10 
PREC 10 CLASSIFIER RULE_10 POLICY ACTION RULE_10 
CLASSIFIER RULE_1 POLICY ACTION RULE_1 
PREC 20 CLASSIFIER RULE_20 POLICY ACTION RULE_20 
PREC 20 CLASSIFIER RULE_20 POLICY ACTION RULE_20 
CLASSIFIER RULE_2 POLICY ACTION RULE_2 
PREC 30 CLASSIFIER RULE_20 POLICY ACTION RULE_30 
Rule 1 
Rule 2 
Rule 3 
PREC 30 CLASSIFIER RULE_20 POLICY ACTION RULE_30 
Rule 1 
Rule 2 
Rule 3 
CLASSIFIER RULE_3 POLICY ACTION RULE_3 
Rule 1 
Rule 2 
Rule 3 
POLICY 
TYPE 
• Global Policy 
• Unknown Subscriber 
Policy 
• Subscriber Policy 
SUBSCRIBER TYPE 
• Static subscriber 
• Dynamic subscriber 
• Radius 
• DHCP 
• Unknown IP SA 
POLICY 
ASSIGNMENT 
• Diameter Gx 
• Predefined 
• Dynamic (gate, 
QoS) 
• Radius 
• Custom 
ANALYTICS & 
CHARGING 
• Syslog 
• IPFIX 
• Radius 
• Gy 
• Gx Usage Monitoring 
© F5 Networks, Inc CONFIDENTIAL 10
Classification & Policy Actions 
APPLICATION CLASSIF. 
• Application Category 
(eg. P2P) 
• Application 
(eg. bittorrent) 
• Some applications are using 
F5 signatures, other 
applications rely on third 
party DPI signature engine 
URL CLASSIF. FLOW CLASSIF. CUSTOM CLASSIF. 
• URL Category 
(eg. Gambling) 
• URL database from third 
party 
• Ability to create custom DB 
• Used for HTTP and 
HTTPS (SNI check) 
• DSCP 
• Protocol (TCP/UDP) 
• IP source address range 
& port 
• IP destination address 
range & port 
• Incoming VLAN 
• irule / TCL script 
• Examples 
• Other fields in the 
traffic flow (ip header, 
http header, ... ) 
• Other fields stored in 
the PEM sessionDB 
for that subscriber 
(RAT-type, roaming, 
tower-id) 
REPORTING 
QUOTA MGMT 
HTTP HDR ENR. 
STEERING (ICAP) 
POLICY ACTIONS 
GATE (FWD) 
CUSTOM / TCL HTTP REDIRECT 
STEERING (NH) 
SERVICE CHAIN 
QOS MARKING 
BW CONTROL 
© F5 Networks, Inc CONFIDENTIAL 11
Intelligent Traffic Steering – Optimize VAS Utilization 
INTELLIGENT STEERING 
PGW/ 
BNG 
PCRF 
Internet 
Diameter Gx 
VIPRION 
Radius 
RTR 
Context-aware & policy-driven 
CONTEXT steering & intelligent service chaining 
Data Center 
Video 
Optimization 
Transparent 
Caching 
Parental 
Controls 
WAP 
Gateway 
SUBSCRIBER 
DEVICE-TYPE 
RAT-TYPE 
CONTENT (VIDEO, URI, ... ) 
CONGESTION 
© F5 Networks, Inc CONFIDENTIAL 12
Policy Controlled Service Chaining –Beyond SDN 
Service Provider VAS 
Video Optimization Parental Control 
LB LB 
POOL 1 POOL 2 
HTTP ICAP 
STEER TO 
VIDEO OPT 
POOL 
STEER TO 
PARENTAL 
CTRL POOL 
LOAD BALANCING 
VAS BYPASS 
SERVER HEALTH CHECKING 
TRAFFIC STEERING 
SERVICE CHAINING 
PEM 
ASSIGN FLOW 
TO SERVICE CHAIN 
Internet 
User 
HEADER ENRICHMENT 
HTTP 
HTTP 
ICAP 
© F5 Networks, Inc CONFIDENTIAL 13
Bandwidth and QoE management 
Gold Subscriber (20 Mbps) 
Silver Subscriber (10 Mbps) 
Bronze Subscriber (5 Mbps) 
PGW/GGSN VIPRION 
Even if subscriber is entitled for more by 
subscriber bandwidth policy his P2P traffic 
gets reduced to configured value (512kbps) 
PER-SUBSCRIBER BANDWIDTH CONTROL 
PER-SUBSCRIBER PER APPLICATION BANDWIDTH CONTROL 
Gold Subscr total (20 Mbps) 
Gold Subscr p2p (512 kbps) 
PGW/GGSN VIPRION 
PCRF
DPI inspection for OTT Identification & Monetization 
OTT MONETIZATION & FLEXIBLE CHARGING 
Gold Subscr total (acct only) 
OTT Service (acct + DSCP mark) PCRF 
PGW/GGSN VIPRION 
• Subscription models / bundles for OTT or specialized service 
• Bundled into subscription for a lower fee 
• OTT traffic excluded from volume bundle 
• OTT traffic marked/tagged for differential treatment at radio layer 
SPECIALIZED 
SERVICE 
(MNO BRAND)
URL Categorization for filtering & parental control 
• URL Filtering 
• Built-in Webroot DB (20M most popular sites) 
• Custom DB 
• SNI based URL categorization 
• Categorizing SSL traffic (HTTPS) 
1. Trying to access blocked 
PGW/ 
GGSN 
Internet 
URL 
RTR 
2. Integrated Webroot 
URL Filtering / Blacklist 
3. Access Denied 
Customer Benefit: Set categories based on regional preferences and categorization 
on HTTPS 
© F5 Networks, Inc CONFIDENTIAL 16
Content Injection for toolbar injection / ad insertion 
1. Content being sent 
back to subscriber; 
data maxed out 
BNG/BRAS Internet 
2. Javascript insertion about 
quota max 
3. Subscriber realizes 
they have maxed out 
data 
• Insert javascript for branded 
toolbar 
• Use it for Ad Insertion 
• Subscriber policy to control 
frequency of insertion 
• Policy selects insertion position 
Insert-content 
• Position <prepend/append> 
• Tag-name <tag> 
• Value-type <string/tcl-snippet> 
• Value <abcd> 
• Frequency <once/once-every/ 
always> 
© F5 Networks, Inc CONFIDENTIAL 17
PEM – Wide range of use cases 
Per-subscriber Application & URL 
Bandwidth Control & Filtering 
• TCP-friendly rate limiter 
• Separate up/down rates 
• Highly scalable solution 
• TCP Optimization as a bonus 
Subscriber Application Analytics 
• Subscriber ID / Rate Plan 
• Charging rules 
• Application Usage Reporting 
Intelligent Traffic Steering 
& Service Chaining to VAS 
• Steer traffic based on 
subscriber profile to Value 
Added Services & 
Optimization Services 
• Intelligent Service Chaining 
Online Charging (Gy) 
• Flexible rating group 
definitions based on 
applications and/or URI 
• Redirect or block upon quota 
expiration 
URL Filtering & Parental Control 
• Government lists 
• Per-subscriber parental 
control opt-in/opt-out 
service 
• For HTTP & HTTPS 
OTT Identification & Monetization 
• Per-subscriber OTT 
application detection 
• Per-OTT bandwidth, marking 
and charging rules 
Header Enrichment & WAP offload 
• HTTP HE for content-based 
charging 
• WAP GW bypass/offload and 
replacement 
Content Injection / Toolbars 
• Java-script based content 
injection 
• Targeted advertisements 
Lightweight BRAS/BNG 
• DHCP-based BNG model 
for wifi and wireline 
deployments 
• Radius AAA client 
© F5 Networks, Inc CONFIDENTIAL 18
Key F5 network services – Optimize, Monetize, Secure 
A unified platform and single management framework 
Intelligent Traffic 
Steering 
Per-Subscriber 
Policy Enforcement 
CGNAT and 
IPv6 Migration 
URL Filtering 
ICSA Certified 
Network Firewall 
TCP 
Local 
DNS 
Optimization 
DPI & 
© F5 Networks, Inc CONFIDENTIAL 19
Optimized DNS Solutions for Service Providers 
• Faster DNS responses to provide for 4G/LTE subscriber growth 
• Manage existing traffic to DNS server infrastructure with BIG-IP 
• Enhanced performance through transparent caching, offloading DNS infrastructure 
Local DNS 
DNS Load Balancing 
Transparent Cache 
Caching Resolver 
Authoritative 
Infrastructure 
• Reduce the DNS servers by offloading the DNS infrastructure 
• High performance DNSSEC validation, offload DNSSEC computations and consolidate services 
• Proactively manage DNS client traffic for greater availability and stability 
• Provide reliable, fast access to online services for in network subscribers 
• Highly scalable authoritative DNS name server 
• Simplify deployment using existing DNS infrastructure to manage the zones 
• Enhance the subscriber experience by making intelligent DNS and GSLB decisions 
• Enable high availability and performance for subscribers by managing UE/MME PDP sessions 
• Intelligent GSLB with ENUM support for IMS / EPC interoperability and NAT64 delivery 
© F5 Networks, Inc CONFIDENTIAL 20
Denial of Service Attacks against DNS 
APPLICATION LAYER ATTACKS TRADITIONAL DDOS MITIGATION 
“Cybercrime is a 
persistent threat in 
today’s world and, 
despite best efforts, no 
business is immune.” 
Network Solutions 
86% 
70% 
37% 
31% 
17% 
9% 10% 
100% 
90% 
80% 
70% 
60% 
50% 
40% 
30% 
20% 
10% 
0% 
HTTP DNS HTTPS SMTP SIP/VoIP IRC Other 
DNS is now the second most 
targeted protocol after HTTP. 
DNS DoS techniques range from: 
• Flooding requests to a given host 
• Reflection attacks against DNS 
infrastructure 
• Reflect / Amplification attacks 
• DNS Cache Poisoning attempts 
50% 
45% 
40% 
35% 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
Of the customers that mitigate DDoS 
attacks, many choose a technique 
that inhibits the ability of DNS to do 
its job 
• DNS is based on UDP 
• DNS DDoS often uses spoofed sources 
• Using an ACL block legitimate clients 
• DNS attacks use massive volumes of 
source addresses, breaking many 
firewalls. 
© F5 Networks, Inc CONFIDENTIAL 21
DNS The F5 way 
• Performance = Add DNS 
boxes 
• Weak DoS/DDoS Protection 
• Firewall is THE bottleneck 
• Strong DoS/DDoS protection 
• Consolidation 
• Protects “Back-End” servers 
CONVENTIONAL DNS 
THINKING 
External 
Firewall 
DNS Load 
Balancing 
F5 PARADIGM SHIFT 
F5 DNS DELIVERY 
REIMAGINED 
Internet 
Array of DNS 
Servers 
Internal 
Firewall 
Hidden 
Master DNS 
DNS Firewall 
DNS DDoS Protection 
Protocol Validation 
Authoritative DNS 
Caching Resolver 
Transparent Caching 
High Performance DNSSEC 
DNSSEC Validation 
Intelligent GSLB 
Internet 
Master DNS 
Infrastructure 
BIG-IP 
© F5 Networks, Inc CONFIDENTIAL 22
Authoritative DNS: Scale with DNS Express 
• High-speed response and DDoS protection with in-memory DNS 
• Authoritative DNS serving out of RAM 
• Configuration size for tens of millions of records 
• Scale and Consolidate DNS Servers 
DNS Server 
Manage 
DNS 
Records 
Answer 
DNS 
Query 
Answer 
Answe 
DNS 
r 
Query 
DNS 
Query 
OS 
NIC 
Admin 
Auth 
Roles 
Dynamic 
DNS 
DHCP 
DNS Express in BIG-IP GTM 
Answer 
DNS 
Query 
Answer 
DNS 
Query 
Answe 
r 
DNS 
Query 
Answe 
Answer 
DNS 
Query 
Answe 
r 
DNS 
Query 
Answe 
Answer 
DNS 
Query 
Internet 
r 
DNS 
Query 
r 
DNS 
Query 
© F5 Networks, Inc CONFIDENTIAL 23
LDNS : Scale with transparent cache 
The Business Case 
• Need to decrease DNS latency and offload 
DNS resolvers 
• Implement transparent DNS caches close 
to the subscriber 
• Deliver DNS scale without impacting 
service 
The F5 Advantage 
F5 DNS Services in Mobile Core F5 DNS Services in Mobile Core 
DNS Resolver 
Infrastructure 
• Scale DNS transparent caches as demand 
increases. Offloads existing DNS 
infrastructure 
• Provides a simple upgrade path to a full 
caching resolver 
- Eliminate the need for centralized DNS 
BIG-IP Platform 
Distributed DNS Transparent Caches 
BIG-IP Platform 
BIG-IP Platform 
Distributed DNS Transparent Caches 
BIG-IP Platform 
© F5 Networks, Inc CONFIDENTIAL 24
Competitive Analysis: DNS Cache Performance 
Infoblox Platform by Platform Comparison with F5 
1400000 
1200000 
1000000 
800000 
600000 
400000 
200000 
0 
2000S Infoblox 
Trinzic 
1420 
2200S Infoblox 
Trinzic 
2210 
4000S Infoblox 
Trinzic 
2220 
7000S Infoblox 
Trinzic 
4010 
7200V Infoblox 
Trinzic 
4030 Platforms are grouped by like pricing 
RPS 
© F5 Networks, Inc CONFIDENTIAL 25
LDNS : Scale and offload with caching resolver 
The Business Case 
• Need faster and scalable query response 
• Desire lower CapEx and OpEx. No need for 
additional DNS resolver farms 
• BIG-IP delivers high performance, scalable 
DNS Caching and Resolving on one 
platform 
The F5 Advantage 
• Faster Web browsing and reduced DNS 
latency 
• Hardened appliance consolidates 10s or 100s 
of servers 
• Greater reliability through resiliency, HA 
• Simplified management, lower cost of 
ownership 
• Consolidate and offload DNS for immediate 
F5 DNS Services in Mobile Core F5 DNS Services in Mobile Core 
ROI 
BIG-IP Platform 
Distributed DNS Caching Resolvers 
BIG-IP Platform 
BIG-IP Platform 
Distributed DNS Caching Resolvers 
BIG-IP Platform 
© F5 Networks, Inc CONFIDENTIAL 26
Client Protection with DNS RPZ 
Prevent subscribers from reaching known bad domains 
Prevent malware and sites hosting malicious content from ever communicating with a client. 
Internet activity starts with a DNS request. Inhibit the threat at the earliest opportunity. 
Live updates 
CACHE 
RESOLVER 
PROTOCOL 
VALIDATION 
IRULES 
IPV4/V6 
LISTENER 
RPZ live feed 
BIG-IP GTM 
REPUTATION 
DATABASE 
SPECIAL 
HANDLING 
© F5 Networks, Inc CONFIDENTIAL 27
DNS IP and Name Reputation Choices 
RESPONSE POLICY ZONES 
INHIBITS THREATS BY FQDN 
IP INTELLIGENCE 
INHIBITS THREATS BY IP 
URL FILTERING 
Ingress DNS path 
Screens a DNS request against domains with a bad reputation. 
Any IP Protocol with iRules 
Intercept a DNS response in iRules. Categorize & make a decision. 
HTTP, HTTPS and DNS with iRules 
Intercept a DNS request in iRules. Categorize & make a decision. 
INHIBITS THREATS BY FQDN 
POLICY CONTROL BY FQDN 
© F5 Networks, Inc CONFIDENTIAL 28
SP Layered Client Protection 
• Response Policy Zones (RPZ) filters out and provides NXDOMAIN / Redirect for know bad domains. 
• URL Filtering further provides granular policy controls using categories. 
• IP Intelligence blocks based on the resolved IP. 
• It can also be used in the data path for other protocols. 
QUERY: WWW.DOMAIN.COM 
RPZ Feed Subscriber Policy 
IPI Feed URL Feed 
iControl iQuery 
DNS iRules (Request / Response) 
CACHE 
RESOLVER 
RPZ 
URL Filtering 
DNS Request Path 
DNS Response Path 
IP Intelligence 
iRule 
EGRESS DNS PATH 
INGRESS DNS PATH 
© F5 Networks, Inc CONFIDENTIAL 29
DNS Tunneling: Prevent it with iRules 
Client A 
Client B 
Client C 
Client D 
Client E 
Client F 
Suspend 
Threshold 
Drop 
Threshold 
Classify the traffic: 
Determine the SLA for RPS and allowed response size. 
When a client sends in a query: 
Is the query for a blocked domain? (A tunnel host) 
Is the query rate above allowed rate? Increment score. 
Client previously above allowed rate? Increment score. 
Resolve request and analyze response. 
- Factor in the response size to the score. 
Take an action: 
Is the client above the score threshold? 
- Drop the request 
- Suspend DNS service for a period. 
QUERY RATE 
SCORING 
RESPONSE 
SIZE SCORING 
© F5 Networks, Inc CONFIDENTIAL 30
Key F5 network services – Optimize, Monetize, Secure 
A unified platform and single management framework 
Intelligent Traffic 
Steering 
Per-Subscriber 
Policy Enforcement 
CGNAT and 
IPv6 Migration 
URL Filtering 
ICSA Certified 
Network Firewall 
TCP 
Local 
DNS 
Optimization 
DPI & 
© F5 Networks, Inc CONFIDENTIAL 31
Пересечение технологий 
Маршрутизатор F5 BIG-IP 
(пакетная обработка) 
(обработка на базе сессий) 
Балансировка 
NAT44 
NAT64 
DS-Lite 
Traffic steering 
Безопасность L4-L7 
SSL и IPsec VPN 
Масштабирование и 
безопасность DNS 
Ускорение WEB 
L2 VPN 
L3 VPN 
Управление 
абонентами 
IP QoS 
IP пиринг 
32 © F5 Networks, Inc. 
© F5 Networks, Inc CONFIDENTIAL 32
Carrier Grade NAT (44, 64) 
NAT4(6)4 
RTR Internet 
Публичное адресное 
пространство IPv4 / IPv6 
PGW/GG VIPRION 
SN 
Частное адресное 
пространство 
NAT4(6)4 
• Динамический NAPT, Deterministic NAPT, Port Block Allocation 
• Расширенные возможности ALG, hairpinning, поддержка EIF/EIM 
• Беспрецедентное масштабирование и производительность (Gbps, cps, max conns) 
• Высокопроизводительное логирование в любом требуемом формате (syslog, 
Netflow); возможно изменение формата полей, например добавление Radius ID, http 
Url и т.п. 
© F5 Networks, Inc CONFIDENTIAL 33
Вопрос 1: Какое максимальное количество пакетов в 
секунду может быть в 1 Gbps канале? 
Ответ: 
~1.488.096 пакетов в секунду в гигабитном канале 
© F5 Networks, Inc CONFIDENTIAL 34
Вопрос 1: Какое максимальное количество пакетов в 
секунду может быть в 1 Gbps канале? 
Frame Part Minimum Frame 
Inter Frame Gap (9.6 ms) 12 bytes 
MAC Preamble (+ SFD) 8 bytes 
MAC Destination Address 6 bytes 
MAC Source Address 6 bytes 
MAC Type (or length) 2 bytes 
Payload (Network PDU) 46 bytes 
Check Sequence (CRC) 4 bytes 
Total Frame Physical Size 84 bytes 
[1,000,000,000 b/s / (84 B * 8 b/B)] == 1,488,096 f/s (maximum rate) 
Size 
© F5 Networks, Inc CONFIDENTIAL 35
Вопрос 2: Какое максимальное значение CPS может быть 
достигнуто для 1Gbps канала? 
Ответ: 
~1.488.096 Соединений в секунду 
Потому что каждый пакет может инициировать соединение (SYN, первый 
UDP пакет в сессии) 
© F5 Networks, Inc CONFIDENTIAL 36
Вопрос 3: Сколько CPS может обработать межсетевой 
экран F5 Networks? 
Connections per second 
8 
6 
4 
2 
0 
Millions 
400k 350k 
Juniper 
(SRX 5800) 
Cisco 
(ASA 5585-X) 
600k 
Check Point 
(61000) 
21x 
8M 
F5 
(VIPRION 4800) 
© F5 Networks, Inc CONFIDENTIAL 37
Key F5 network services – Optimize, Monetize, Secure 
A unified platform and single management framework 
Intelligent Traffic 
Steering 
Per-Subscriber 
Policy Enforcement 
CGNAT and 
IPv6 Migration 
URL Filtering 
ICSA Certified 
Network Firewall 
TCP 
Local 
DNS 
Optimization 
DPI & 
© F5 Networks, Inc CONFIDENTIAL 38
Mobile Has Unique Challenges 
Why is the web so slow on my mobile device? 
Mobile Device 
• TCP stacks are different 
on different mobile OS 
• JavaScript parsing and 
execution is relatively 
slow on mobile devices 
Mobile Network 
• Higher packet loss rate 
• High network latency: 
300ms via 3G vs <50ms 
on LTE 
• Connections are made 
ad-hoc and frequently 
dropped to preserve 
spectrum and battery 
life 
Internet 
• Low packet loss 
rate 
• Low latency (except 
for intercontinental 
traffic) 
Application 
• Different TCP stacks 
being used on 
servers, some of 
which are not optimal 
for mobile networks 
© F5 Networks, Inc CONFIDENTIAL 39
Content Optimization – A Changing Environment 
SSL / SPDY INCREASE 
• In many countries, SSL traffic (HTTPS and SPDY) on mobile 
networks is currently reaching around 50% of total Internet traffic 
• Top web sites such as Google, Facebook, and Twitter use SPDY 
• HTTP 2.0 being standardized in IETF with browsers requiring TLS 
encryption when setting up HTTP 2.0 connections 
RISE OF ADAPTIVE BIT RATE VIDEO STREAMING 
• Top video sites such as YouTube, Netflix, Hulu, and BBC iPlayer 
have all embraced ABR video technology 
• Video is encoded at different bit rates, client dynamically chooses 
or changes appropriate bit rate based on network conditions 
© F5 Networks, Inc CONFIDENTIAL 40
TCP Protocol Review 
• TCP is a connection-oriented protocol 
• Client and server must establish a connection before any data can be 
transfered 
• TCP provides reliability 
• Knows that data it sends is correctly received by the other end 
• Acknowledgements confirm delivery of data received by TCP receiver 
• Ack for data sent only after data has reached receiver 
• TCP implements flow control and congestion control 
• Sender can not overwhelm a receiver with data 
• Sender will "back off" when under congestion 
© F5 Networks, Inc CONFIDENTIAL 41
Impact of Latency – Web Page Load Times 
Source: Ilya Grigorik, Google 
© F5 Networks, Inc CONFIDENTIAL 42
Impact of Packet Loss – Throughput Degradation 
• TCP designed to probe the network to figure out available capacity 
• TCP slow start is a feature, not a bug 
Avg HTTP 
response 
size 16 kB (3 
round trips) 
In mobile networks packet 
loss does not necessarily 
imply congestion 
Source: Ilya Grigorik, Google 
© F5 Networks, Inc CONFIDENTIAL 43
TCP Optimization with F5 
High Goodput Minimal Buffer 
Flow Fairness 
Bloat 
VIPRION 
Origin 
Server 
INTERNET 
PGW/ 
GGSN 
RTR 
2G/3G 
LTE 
Mobile 
Client 
TCP 
EXPRESS Cell-optimized TCP stack WAN-optimized TCP stack 
© F5 Networks, Inc CONFIDENTIAL 44
TCP Congestion Control Algorithms 
• Loss-based algorithms 
• Reno, New Reno, High-Speed, 
Scalable, BIC, CUBIC 
• Delay-based algorithms 
• Vegas 
• Bandwidth-estimating algorithms 
• Westwood, Westwood+ 
• Hybrid delay/loss algorithms 
• Illinois, Woodside (F5) 
RENO CUBIC 
ILLINOIS 
© F5 Networks, Inc CONFIDENTIAL 45
TCP Congestion Control Algorithms in 3G and LTE 
TCP Woodside 
• F5 created algorithm. 
• Hybrid loss and latency based algorithm. 
• Minimizes buffer bloat by constantly monitoring 
network buffering. 
TCP Vegas 
• Emphasizes packet delay rather than packet loss 
• Detects congestion based on increasing RTT 
values of packets. 
TCP Illinois 
• Targeted at high speed long distance networks 
• Loss-delay based algorithm. 
• Primary congestion of packet loss determines 
direction of window size change. 
• Secondary congestion of queuing delay 
determines the pace of window size changes. 
H-TCP 
• Targeted for high speed networks with high latency. 
• Loss-based algorithm. 
© F5 Networks, Inc CONFIDENTIAL 46
TCP tuning for mobile networks 
• Mobile networks have a large BDP 
• Tune your TCP buffers accordingly 
• Mobile networks can exhibit random packet loss 
• Choose a TCP congestion control algorithm/technique that takes this into 
account (don’t get into slow start upon random packet loss) 
• Mobile networks can suffer from buffer bloat issues 
• Choose a TCP congestion control algorithm that does not rely solely on packet 
loss 
• Enable TCP rate shaping to ensure ‘smoother’ delivery packets (less strain on 
buffers) 
• Mobile networks have relatively high latency 
• Tune your settings to increase performance and web page load times (window 
size, initial congestion window, ... ) 
© F5 Networks, Inc CONFIDENTIAL 47 
• Real life mobile performance is very ‘variable’ – room for market
Reducing Web Page Load Times with F5 TCP Express 
Real life test results – MNO in APAC 
Business 
center 
Shopping 
Mall 
Residential 
Area 
Business 
center 
Shopping 
Mall 
Case 1 – 100 * 64KB images Case 2 – 1 * 10MB image 
Residential 
Area 
Business 
center 
Shopping 
Mall 
Residential 
Area 
Case 3 – Regular website 1 Case 4 – Regular website 2 
Business 
center 
Shopping 
Mall 
Residential 
Area 
Optimized (sec) 
As-is (sec) 
Improvement (%) 
© F5 Networks, Inc CONFIDENTIAL 48
HTTP Performance Tests – Radio Strength Variances 
Real life test results – MNO in EMEA 
200% 
180% 
160% 
140% 
120% 
100% 
80% 
60% 
40% 
20% 
0% 
3G 4G 
HTTP large download 
HTTP small download 
196% 95% 22% 14% 
Poor coverage Good coverage 
Large download: HTTP page with large images (throughput test) 
Small download: HTTP page with small objects (web browsing test) 
40% 
35% 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
HTTP large download 
HTTP small download 
38% 33% 20% 28% 
Poor coverage Good coverage 
TCP OPTIMIZATION BENEFITS INCREASE UNDER POOR RADIO COVERAGE 
© F5 Networks, Inc CONFIDENTIAL 49
TCP Optimization – Summary 
Increases “goodput” on radio network and keeps latency under control 
Works for > 90% of all Internet traffic regardless of encryption or 
encoding 
Lengthens life span of radio infrastructure and enhances user 
experience 
Deployed inline on Gi LAN, optionally consolidated with other L4-7 
functions 
© F5 Networks, Inc CONFIDENTIAL 50
To stay in touch please join our LinkedIn Group! 
© F5 Networks, Inc CONFIDENTIAL 51
F5 Solutions for Service Providers

More Related Content

What's hot

[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹
[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹
[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹InfraEngineer
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2Febrian ‎
 
LTM essentials
LTM essentialsLTM essentials
LTM essentialsbharadwajv
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)Networkel
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
Next Generation IP Transport
Next Generation IP TransportNext Generation IP Transport
Next Generation IP TransportMyNOG
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkCisco Canada
 
Cisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdfCisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdfjuergenJaeckel
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and securityMichael Earls
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationBayu Wibowo
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFVuz Dở Hơi
 
RUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZoneRUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZoneCarla Nadin
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentationvirtualsouthwest
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Bruno Teixeira
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 

What's hot (20)

[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹
[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹
[MeetUp][1st] 오리뎅이의_쿠버네티스_네트워킹
 
Cisco nx os
Cisco nx os Cisco nx os
Cisco nx os
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2
 
LTM essentials
LTM essentialsLTM essentials
LTM essentials
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Next Generation IP Transport
Next Generation IP TransportNext Generation IP Transport
Next Generation IP Transport
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS Network
 
Cisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdfCisco Catalyst 6500 Technical Deep Dive.pdf
Cisco Catalyst 6500 Technical Deep Dive.pdf
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
 
Onboard Automation with EEM
Onboard Automation with EEM Onboard Automation with EEM
Onboard Automation with EEM
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
RUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZoneRUCKUS Unleashed & SmartZone
RUCKUS Unleashed & SmartZone
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
 
IMS ENUM & DNS Mechanism
IMS ENUM & DNS MechanismIMS ENUM & DNS Mechanism
IMS ENUM & DNS Mechanism
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 

Viewers also liked

F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security ServicesAmazon Web Services
 
F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 Networks
 
F5 study guide
F5 study guideF5 study guide
F5 study guideshimera123
 
F5 Carrier-Grade NAT (CGNAT): техническое описание
F5 Carrier-Grade NAT (CGNAT): техническое описаниеF5 Carrier-Grade NAT (CGNAT): техническое описание
F5 Carrier-Grade NAT (CGNAT): техническое описаниеDmitry Tikhovich
 
Ocs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesOcs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesThiago Gutierri
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterF5NetworksAPJ
 
Demand driven applications with om.next and react native
Demand driven applications with om.next and react nativeDemand driven applications with om.next and react native
Demand driven applications with om.next and react nativedvcrn
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 
Voxeo Summit Day 1 - Prophecy log search
Voxeo Summit Day 1 - Prophecy log searchVoxeo Summit Day 1 - Prophecy log search
Voxeo Summit Day 1 - Prophecy log searchVoxeo Corp
 
Sko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo FinalSko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo Finalkieran1a
 
OTT_BypassFraud
OTT_BypassFraudOTT_BypassFraud
OTT_BypassFraudTom Wilson
 
Over-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xvOver-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xvTom Wilson
 
F5 network presenation 2013 Q1
F5 network presenation 2013 Q1F5 network presenation 2013 Q1
F5 network presenation 2013 Q1Andrew Wong
 

Viewers also liked (20)

F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security Services
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer Training
 
F5 study guide
F5 study guideF5 study guide
F5 study guide
 
F5 Carrier-Grade NAT (CGNAT): техническое описание
F5 Carrier-Grade NAT (CGNAT): техническое описаниеF5 Carrier-Grade NAT (CGNAT): техническое описание
F5 Carrier-Grade NAT (CGNAT): техническое описание
 
Ocs F5 Bigip Bestpractices
Ocs F5 Bigip BestpracticesOcs F5 Bigip Bestpractices
Ocs F5 Bigip Bestpractices
 
Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Demand driven applications with om.next and react native
Demand driven applications with om.next and react nativeDemand driven applications with om.next and react native
Demand driven applications with om.next and react native
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Avnet Comms Portfolio
Avnet Comms PortfolioAvnet Comms Portfolio
Avnet Comms Portfolio
 
Voxeo Summit Day 1 - Prophecy log search
Voxeo Summit Day 1 - Prophecy log searchVoxeo Summit Day 1 - Prophecy log search
Voxeo Summit Day 1 - Prophecy log search
 
Sko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo FinalSko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo Final
 
OTT_BypassFraud
OTT_BypassFraudOTT_BypassFraud
OTT_BypassFraud
 
Over-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xvOver-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xv
 
F5 network presenation 2013 Q1
F5 network presenation 2013 Q1F5 network presenation 2013 Q1
F5 network presenation 2013 Q1
 

Similar to F5 Solutions for Service Providers

09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad IrzanIndonesia Network Operators Group
 
Banv meetup 04162014
Banv meetup 04162014Banv meetup 04162014
Banv meetup 04162014ozkan01
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...gogo6
 
Banv meetup-contrail
Banv meetup-contrailBanv meetup-contrail
Banv meetup-contrailnvirters
 
PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite
PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite
PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite PROIDEA
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Bruno Teixeira
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
Converging IPTV and OTT: Building an Enhanced Value Proposition for Consumers
Converging IPTV and OTT: Building an Enhanced Value Proposition for ConsumersConverging IPTV and OTT: Building an Enhanced Value Proposition for Consumers
Converging IPTV and OTT: Building an Enhanced Value Proposition for ConsumersVerimatrix
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business TransformationCisco Service Provider
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep DiveAlan Percy
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-FiCisco Canada
 
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecОбеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecCisco Russia
 

Similar to F5 Solutions for Service Providers (20)

F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
Open v ran
Open v ranOpen v ran
Open v ran
 
Banv meetup 04162014
Banv meetup 04162014Banv meetup 04162014
Banv meetup 04162014
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
 
Banv meetup-contrail
Banv meetup-contrailBanv meetup-contrail
Banv meetup-contrail
 
PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite
PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite
PLNOG 9: Marcin Strzyżewski, Marcin Wawrzyński - Videoscape Distribution Suite
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015
Software Defined Network (SDN) using ASR9000 :: BRKSPG-2722 | San Diego 2015
 
Open Networking Summit
Open Networking SummitOpen Networking Summit
Open Networking Summit
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Converging IPTV and OTT: Building an Enhanced Value Proposition for Consumers
Converging IPTV and OTT: Building an Enhanced Value Proposition for ConsumersConverging IPTV and OTT: Building an Enhanced Value Proposition for Consumers
Converging IPTV and OTT: Building an Enhanced Value Proposition for Consumers
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecОбеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
 

More from BAKOTECH

Upd pci compliance
Upd pci compliance Upd pci compliance
Upd pci compliance BAKOTECH
 
Threat Detection & Response
Threat Detection & ResponseThreat Detection & Response
Threat Detection & ResponseBAKOTECH
 
WatchGuard SD-WAN
WatchGuard SD-WAN WatchGuard SD-WAN
WatchGuard SD-WAN BAKOTECH
 
WatchGuard WIPS
WatchGuard WIPSWatchGuard WIPS
WatchGuard WIPSBAKOTECH
 
WatchGuard Authpoint
WatchGuard Authpoint WatchGuard Authpoint
WatchGuard Authpoint BAKOTECH
 
McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019 McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019 BAKOTECH
 
F5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложенийF5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложенийBAKOTECH
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270BAKOTECH
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от IxiaBAKOTECH
 
Cloud Visibility for Dummies от IXIA
Cloud Visibility for Dummies от IXIACloud Visibility for Dummies от IXIA
Cloud Visibility for Dummies от IXIABAKOTECH
 
Network Visibility for Dummies
Network Visibility for DummiesNetwork Visibility for Dummies
Network Visibility for DummiesBAKOTECH
 
SIEM for Beginners
SIEM for BeginnersSIEM for Beginners
SIEM for BeginnersBAKOTECH
 
SIEM для чайников
SIEM для чайниковSIEM для чайников
SIEM для чайниковBAKOTECH
 
Обеспечение безопасности активов современного бизнеса с помощью криптографии
Обеспечение безопасности активов современного бизнеса с помощью криптографии Обеспечение безопасности активов современного бизнеса с помощью криптографии
Обеспечение безопасности активов современного бизнеса с помощью криптографии BAKOTECH
 
Надежная защита от утечек информации в условиях современных тенденций ИТ
Надежная защита от утечек информации в условиях современных тенденций ИТНадежная защита от утечек информации в условиях современных тенденций ИТ
Надежная защита от утечек информации в условиях современных тенденций ИТBAKOTECH
 
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...BAKOTECH
 
Внутренняя угроза: выявление и защита с помощью ObserveIT
Внутренняя угроза: выявление и защита с помощью ObserveITВнутренняя угроза: выявление и защита с помощью ObserveIT
Внутренняя угроза: выявление и защита с помощью ObserveITBAKOTECH
 
Обзор инструментов Toad для администраторов Oracle
Обзор инструментов Toad для администраторов OracleОбзор инструментов Toad для администраторов Oracle
Обзор инструментов Toad для администраторов OracleBAKOTECH
 

More from BAKOTECH (20)

SOAR
SOARSOAR
SOAR
 
Upd pci compliance
Upd pci compliance Upd pci compliance
Upd pci compliance
 
Threat Detection & Response
Threat Detection & ResponseThreat Detection & Response
Threat Detection & Response
 
WatchGuard SD-WAN
WatchGuard SD-WAN WatchGuard SD-WAN
WatchGuard SD-WAN
 
WatchGuard WIPS
WatchGuard WIPSWatchGuard WIPS
WatchGuard WIPS
 
WatchGuard Authpoint
WatchGuard Authpoint WatchGuard Authpoint
WatchGuard Authpoint
 
McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019 McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019
 
F5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложенийF5 labs 2018. Отчет по защите веб-приложений
F5 labs 2018. Отчет по защите веб-приложений
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Cloud Visibility for Dummies от IXIA
Cloud Visibility for Dummies от IXIACloud Visibility for Dummies от IXIA
Cloud Visibility for Dummies от IXIA
 
Network Visibility for Dummies
Network Visibility for DummiesNetwork Visibility for Dummies
Network Visibility for Dummies
 
SIEM for Beginners
SIEM for BeginnersSIEM for Beginners
SIEM for Beginners
 
SIEM для чайников
SIEM для чайниковSIEM для чайников
SIEM для чайников
 
Обеспечение безопасности активов современного бизнеса с помощью криптографии
Обеспечение безопасности активов современного бизнеса с помощью криптографии Обеспечение безопасности активов современного бизнеса с помощью криптографии
Обеспечение безопасности активов современного бизнеса с помощью криптографии
 
Надежная защита от утечек информации в условиях современных тенденций ИТ
Надежная защита от утечек информации в условиях современных тенденций ИТНадежная защита от утечек информации в условиях современных тенденций ИТ
Надежная защита от утечек информации в условиях современных тенденций ИТ
 
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
Проблематика безопасности баз данных. Выявление уязвимостей, контроль транзак...
 
Внутренняя угроза: выявление и защита с помощью ObserveIT
Внутренняя угроза: выявление и защита с помощью ObserveITВнутренняя угроза: выявление и защита с помощью ObserveIT
Внутренняя угроза: выявление и защита с помощью ObserveIT
 
Обзор инструментов Toad для администраторов Oracle
Обзор инструментов Toad для администраторов OracleОбзор инструментов Toad для администраторов Oracle
Обзор инструментов Toad для администраторов Oracle
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

F5 Solutions for Service Providers

  • 1. CONFIDENTIAL F5 Solutions for Service Providers Bart Salaets Solution Architect
  • 2. Complex network architectures Value-added services (VAS) Video optimization Transparent caching URL filtering Static port80 based steering into VAS complex Internet DNS PCRF IMS AAA HSS OCS DRA RTR L2 Switch DPI/TDF FW RTR End Users Control Plane GGSN/PG CGNAT Challenges • Complex architecture, hard to scale • Resulting high CapEx and OpEx • Difficulty adding new services LDNS BRAS/BNG Multiple point product solutions inline in the data path W © F5 Networks, Inc CONFIDENTIAL 2
  • 3. The new network should focus on … Optimize Monetize Secure Quality of Experience mgmt Flexible opt-in/opt-out services Flexible charging Intelligent steering to VAS Consolidate L4-L7 functions TCP Optimization Migrate to NFV-based solution Network Security (Gi FW) Dynamic subscriber security DNS Security IPv4/IPv6 Transition © F5 Networks, Inc CONFIDENTIAL 3
  • 4. A Consolidated Approach with F5 Simplifying the delivery of L4-L7 network services BEFORE F5 WITH F5 VAS layer LDNS Policy URL CGNAT Internet Static port 80 steering RTR PGW/ Firewall BNG PGW/ BNG Enforcement Internet Filtering VAS layer Dynamic & intelligent steering VIPRION © F5 Networks, Inc CONFIDENTIAL 4
  • 5. Consolidate L4-L7 Network Functions with F5 L2 switching MPLS L2 PE L3 routing MPLS L3 PE BRAS/BNG 2005–2010 L2–L3 L4–L7 2010–2014 Full Proxy (TCP opt, HHE) Firewall L3/L4 Steering Policy Enforcement CGNAT TCP OPTIM DPI/PCEF L7 STEERING FW/CGN HTTP HE Multi-service router IP ROUTING MPLS L2 PE MPLS L3 PE BRAS/BNG Dedicated platforms, different vendors Single platform, L2–L3 consolidation Dedicated platforms, different vendors Unified platform, L4–L7 consolidation © F5 Networks, Inc CONFIDENTIAL 5
  • 6. Purpose Built Platforms for L4-L7 Services 10,000,000 9,000,000 8,000,000 7,000,000 6,000,000 5,000,000 4,000,000 3,000,000 2,000,000 1,000,000 0 BIG-IP 11050 2.5M L7 RPS 1M L4 CPS 40/42G L7/L4 TPUT BIG-IP 4200v 850k L7 RPS 300K L4 CPS 10G L7/L4 TPUT VIPRION 2400 8M L7 RPS 4M L4 CPS 320G L7/L4 TPUT VIPRION 4480 10M L7 RPS 5.6M L4 CPS 160/320G L7/L4 TPUT BIG-IP 10200v 2M L7 RPS 1M L4 CPS 40/80G L7/L4 TPUT BIG-IP 2200s 425K L7 RPS 150K L4 CPS 5G L7/L4 TPUT BIG-IP 5200v 1.5M L7 RPS 700K L4 CPS 15/30G L7/L4 TPUT BIG-IP 7200v 1.6M L7 RPS 775K L4 CPS 20/40G L7/L4 TPUT BIG-IP Virtual Edition Up to 325K L7 RPS Up to 100K L4 CPS 10G L7/L4 TPUT VIPRION 2200 4M L7 RPS 2M L4 CPS 160G L7/L4 TPUT VIPRION 4800 20M L7 RPS 10M L4 CPS 320/640G L7/L4TPUT BIG-IP Virtual EditionBIG-IP 2000 Series BIG-IP 4000 Series BIG-IP 5000 Series BIG-IP 7000 SeriesBIG-IP 10000 SeriesBIG-IP 11000 Series VIPRION 2200 VIPRION 2400 VIPRION 4480 VIPRION 4800 L7 Requests Per Second (Inf-Inf) © F5 Networks, Inc CONFIDENTIAL 6
  • 7. BIG-IQ Cloud™ BIG-IP® Advanced Firewall Manager (AFM) BIG-IP / BIG-IQ – Technology Suite BIG-IQ Device™ BIG-IQ Platform™ BIG-IP® Applicatio n Security Manager (ASM) BIG-IQ Security™ BIG-IP® DNS Modules (GTM) BIG-IP® Local Traffic Manager (LTM) BIG-IP® Carrier Grade NAT (CGNAT) BIG-IP® Policy Enf. Manager (PEM) BIG-IP® Access Policy Manager (APM) Plugin Eco Syste m VMWare Cisco APIC Microsoft SCVMM OpenStack AWS Open Connector ADC Service Provider Security Cloud Orchestration BIG-IQ ADC BIG-IQ MAM BIG-IP® Acceleratio n Manager (AM) MobileSaf e and WebSafe (Versafe) iRules®, iApps®, iCall, iStats and iControl® Manageability RBAC, Logging, SNMP, CLI, GUI L3/Routing, UDP, IP, IPSec, IPv6, SCTP, TCP, HTTP, SSL, FIPS, Tunneling, BWC, Stats, Certifications CMP, VCMP, ScaleN, Firmware, HAL, Sizing Guides KVM / AWS / Xen VMWare / HyperV Programmability Core Protocols Performance / Scalability TMOS Operating System Appliances Chassis Software TMOS Fabric © F5 Networks, Inc CONFIDENTIAL 7
  • 8. Key F5 network services – Optimize, Monetize, Secure A unified platform and single management framework Intelligent Traffic Steering Per-Subscriber Policy Enforcement CGNAT and IPv6 Migration URL Filtering ICSA Certified Network Firewall TCP Local DNS Optimization DPI & © F5 Networks, Inc CONFIDENTIAL 8
  • 9. Key F5 network services – Optimize, Monetize, Secure A unified platform and single management framework Intelligent Traffic Steering Per-Subscriber Policy Enforcement CGNAT and IPv6 Migration URL Filtering ICSA Certified Network Firewall TCP Local DNS Optimization DPI & © F5 Networks, Inc CONFIDENTIAL 9
  • 10. Policy Enforcement Manager – Policy Definition Policy Name Bronze Policy Name Silver Policy Name Gold PREC 10 CLASSIFIER RULE_10 POLICY ACTION RULE_10 PREC 10 CLASSIFIER RULE_10 POLICY ACTION RULE_10 CLASSIFIER RULE_1 POLICY ACTION RULE_1 PREC 20 CLASSIFIER RULE_20 POLICY ACTION RULE_20 PREC 20 CLASSIFIER RULE_20 POLICY ACTION RULE_20 CLASSIFIER RULE_2 POLICY ACTION RULE_2 PREC 30 CLASSIFIER RULE_20 POLICY ACTION RULE_30 Rule 1 Rule 2 Rule 3 PREC 30 CLASSIFIER RULE_20 POLICY ACTION RULE_30 Rule 1 Rule 2 Rule 3 CLASSIFIER RULE_3 POLICY ACTION RULE_3 Rule 1 Rule 2 Rule 3 POLICY TYPE • Global Policy • Unknown Subscriber Policy • Subscriber Policy SUBSCRIBER TYPE • Static subscriber • Dynamic subscriber • Radius • DHCP • Unknown IP SA POLICY ASSIGNMENT • Diameter Gx • Predefined • Dynamic (gate, QoS) • Radius • Custom ANALYTICS & CHARGING • Syslog • IPFIX • Radius • Gy • Gx Usage Monitoring © F5 Networks, Inc CONFIDENTIAL 10
  • 11. Classification & Policy Actions APPLICATION CLASSIF. • Application Category (eg. P2P) • Application (eg. bittorrent) • Some applications are using F5 signatures, other applications rely on third party DPI signature engine URL CLASSIF. FLOW CLASSIF. CUSTOM CLASSIF. • URL Category (eg. Gambling) • URL database from third party • Ability to create custom DB • Used for HTTP and HTTPS (SNI check) • DSCP • Protocol (TCP/UDP) • IP source address range & port • IP destination address range & port • Incoming VLAN • irule / TCL script • Examples • Other fields in the traffic flow (ip header, http header, ... ) • Other fields stored in the PEM sessionDB for that subscriber (RAT-type, roaming, tower-id) REPORTING QUOTA MGMT HTTP HDR ENR. STEERING (ICAP) POLICY ACTIONS GATE (FWD) CUSTOM / TCL HTTP REDIRECT STEERING (NH) SERVICE CHAIN QOS MARKING BW CONTROL © F5 Networks, Inc CONFIDENTIAL 11
  • 12. Intelligent Traffic Steering – Optimize VAS Utilization INTELLIGENT STEERING PGW/ BNG PCRF Internet Diameter Gx VIPRION Radius RTR Context-aware & policy-driven CONTEXT steering & intelligent service chaining Data Center Video Optimization Transparent Caching Parental Controls WAP Gateway SUBSCRIBER DEVICE-TYPE RAT-TYPE CONTENT (VIDEO, URI, ... ) CONGESTION © F5 Networks, Inc CONFIDENTIAL 12
  • 13. Policy Controlled Service Chaining –Beyond SDN Service Provider VAS Video Optimization Parental Control LB LB POOL 1 POOL 2 HTTP ICAP STEER TO VIDEO OPT POOL STEER TO PARENTAL CTRL POOL LOAD BALANCING VAS BYPASS SERVER HEALTH CHECKING TRAFFIC STEERING SERVICE CHAINING PEM ASSIGN FLOW TO SERVICE CHAIN Internet User HEADER ENRICHMENT HTTP HTTP ICAP © F5 Networks, Inc CONFIDENTIAL 13
  • 14. Bandwidth and QoE management Gold Subscriber (20 Mbps) Silver Subscriber (10 Mbps) Bronze Subscriber (5 Mbps) PGW/GGSN VIPRION Even if subscriber is entitled for more by subscriber bandwidth policy his P2P traffic gets reduced to configured value (512kbps) PER-SUBSCRIBER BANDWIDTH CONTROL PER-SUBSCRIBER PER APPLICATION BANDWIDTH CONTROL Gold Subscr total (20 Mbps) Gold Subscr p2p (512 kbps) PGW/GGSN VIPRION PCRF
  • 15. DPI inspection for OTT Identification & Monetization OTT MONETIZATION & FLEXIBLE CHARGING Gold Subscr total (acct only) OTT Service (acct + DSCP mark) PCRF PGW/GGSN VIPRION • Subscription models / bundles for OTT or specialized service • Bundled into subscription for a lower fee • OTT traffic excluded from volume bundle • OTT traffic marked/tagged for differential treatment at radio layer SPECIALIZED SERVICE (MNO BRAND)
  • 16. URL Categorization for filtering & parental control • URL Filtering • Built-in Webroot DB (20M most popular sites) • Custom DB • SNI based URL categorization • Categorizing SSL traffic (HTTPS) 1. Trying to access blocked PGW/ GGSN Internet URL RTR 2. Integrated Webroot URL Filtering / Blacklist 3. Access Denied Customer Benefit: Set categories based on regional preferences and categorization on HTTPS © F5 Networks, Inc CONFIDENTIAL 16
  • 17. Content Injection for toolbar injection / ad insertion 1. Content being sent back to subscriber; data maxed out BNG/BRAS Internet 2. Javascript insertion about quota max 3. Subscriber realizes they have maxed out data • Insert javascript for branded toolbar • Use it for Ad Insertion • Subscriber policy to control frequency of insertion • Policy selects insertion position Insert-content • Position <prepend/append> • Tag-name <tag> • Value-type <string/tcl-snippet> • Value <abcd> • Frequency <once/once-every/ always> © F5 Networks, Inc CONFIDENTIAL 17
  • 18. PEM – Wide range of use cases Per-subscriber Application & URL Bandwidth Control & Filtering • TCP-friendly rate limiter • Separate up/down rates • Highly scalable solution • TCP Optimization as a bonus Subscriber Application Analytics • Subscriber ID / Rate Plan • Charging rules • Application Usage Reporting Intelligent Traffic Steering & Service Chaining to VAS • Steer traffic based on subscriber profile to Value Added Services & Optimization Services • Intelligent Service Chaining Online Charging (Gy) • Flexible rating group definitions based on applications and/or URI • Redirect or block upon quota expiration URL Filtering & Parental Control • Government lists • Per-subscriber parental control opt-in/opt-out service • For HTTP & HTTPS OTT Identification & Monetization • Per-subscriber OTT application detection • Per-OTT bandwidth, marking and charging rules Header Enrichment & WAP offload • HTTP HE for content-based charging • WAP GW bypass/offload and replacement Content Injection / Toolbars • Java-script based content injection • Targeted advertisements Lightweight BRAS/BNG • DHCP-based BNG model for wifi and wireline deployments • Radius AAA client © F5 Networks, Inc CONFIDENTIAL 18
  • 19. Key F5 network services – Optimize, Monetize, Secure A unified platform and single management framework Intelligent Traffic Steering Per-Subscriber Policy Enforcement CGNAT and IPv6 Migration URL Filtering ICSA Certified Network Firewall TCP Local DNS Optimization DPI & © F5 Networks, Inc CONFIDENTIAL 19
  • 20. Optimized DNS Solutions for Service Providers • Faster DNS responses to provide for 4G/LTE subscriber growth • Manage existing traffic to DNS server infrastructure with BIG-IP • Enhanced performance through transparent caching, offloading DNS infrastructure Local DNS DNS Load Balancing Transparent Cache Caching Resolver Authoritative Infrastructure • Reduce the DNS servers by offloading the DNS infrastructure • High performance DNSSEC validation, offload DNSSEC computations and consolidate services • Proactively manage DNS client traffic for greater availability and stability • Provide reliable, fast access to online services for in network subscribers • Highly scalable authoritative DNS name server • Simplify deployment using existing DNS infrastructure to manage the zones • Enhance the subscriber experience by making intelligent DNS and GSLB decisions • Enable high availability and performance for subscribers by managing UE/MME PDP sessions • Intelligent GSLB with ENUM support for IMS / EPC interoperability and NAT64 delivery © F5 Networks, Inc CONFIDENTIAL 20
  • 21. Denial of Service Attacks against DNS APPLICATION LAYER ATTACKS TRADITIONAL DDOS MITIGATION “Cybercrime is a persistent threat in today’s world and, despite best efforts, no business is immune.” Network Solutions 86% 70% 37% 31% 17% 9% 10% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% HTTP DNS HTTPS SMTP SIP/VoIP IRC Other DNS is now the second most targeted protocol after HTTP. DNS DoS techniques range from: • Flooding requests to a given host • Reflection attacks against DNS infrastructure • Reflect / Amplification attacks • DNS Cache Poisoning attempts 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Of the customers that mitigate DDoS attacks, many choose a technique that inhibits the ability of DNS to do its job • DNS is based on UDP • DNS DDoS often uses spoofed sources • Using an ACL block legitimate clients • DNS attacks use massive volumes of source addresses, breaking many firewalls. © F5 Networks, Inc CONFIDENTIAL 21
  • 22. DNS The F5 way • Performance = Add DNS boxes • Weak DoS/DDoS Protection • Firewall is THE bottleneck • Strong DoS/DDoS protection • Consolidation • Protects “Back-End” servers CONVENTIONAL DNS THINKING External Firewall DNS Load Balancing F5 PARADIGM SHIFT F5 DNS DELIVERY REIMAGINED Internet Array of DNS Servers Internal Firewall Hidden Master DNS DNS Firewall DNS DDoS Protection Protocol Validation Authoritative DNS Caching Resolver Transparent Caching High Performance DNSSEC DNSSEC Validation Intelligent GSLB Internet Master DNS Infrastructure BIG-IP © F5 Networks, Inc CONFIDENTIAL 22
  • 23. Authoritative DNS: Scale with DNS Express • High-speed response and DDoS protection with in-memory DNS • Authoritative DNS serving out of RAM • Configuration size for tens of millions of records • Scale and Consolidate DNS Servers DNS Server Manage DNS Records Answer DNS Query Answer Answe DNS r Query DNS Query OS NIC Admin Auth Roles Dynamic DNS DHCP DNS Express in BIG-IP GTM Answer DNS Query Answer DNS Query Answe r DNS Query Answe Answer DNS Query Answe r DNS Query Answe Answer DNS Query Internet r DNS Query r DNS Query © F5 Networks, Inc CONFIDENTIAL 23
  • 24. LDNS : Scale with transparent cache The Business Case • Need to decrease DNS latency and offload DNS resolvers • Implement transparent DNS caches close to the subscriber • Deliver DNS scale without impacting service The F5 Advantage F5 DNS Services in Mobile Core F5 DNS Services in Mobile Core DNS Resolver Infrastructure • Scale DNS transparent caches as demand increases. Offloads existing DNS infrastructure • Provides a simple upgrade path to a full caching resolver - Eliminate the need for centralized DNS BIG-IP Platform Distributed DNS Transparent Caches BIG-IP Platform BIG-IP Platform Distributed DNS Transparent Caches BIG-IP Platform © F5 Networks, Inc CONFIDENTIAL 24
  • 25. Competitive Analysis: DNS Cache Performance Infoblox Platform by Platform Comparison with F5 1400000 1200000 1000000 800000 600000 400000 200000 0 2000S Infoblox Trinzic 1420 2200S Infoblox Trinzic 2210 4000S Infoblox Trinzic 2220 7000S Infoblox Trinzic 4010 7200V Infoblox Trinzic 4030 Platforms are grouped by like pricing RPS © F5 Networks, Inc CONFIDENTIAL 25
  • 26. LDNS : Scale and offload with caching resolver The Business Case • Need faster and scalable query response • Desire lower CapEx and OpEx. No need for additional DNS resolver farms • BIG-IP delivers high performance, scalable DNS Caching and Resolving on one platform The F5 Advantage • Faster Web browsing and reduced DNS latency • Hardened appliance consolidates 10s or 100s of servers • Greater reliability through resiliency, HA • Simplified management, lower cost of ownership • Consolidate and offload DNS for immediate F5 DNS Services in Mobile Core F5 DNS Services in Mobile Core ROI BIG-IP Platform Distributed DNS Caching Resolvers BIG-IP Platform BIG-IP Platform Distributed DNS Caching Resolvers BIG-IP Platform © F5 Networks, Inc CONFIDENTIAL 26
  • 27. Client Protection with DNS RPZ Prevent subscribers from reaching known bad domains Prevent malware and sites hosting malicious content from ever communicating with a client. Internet activity starts with a DNS request. Inhibit the threat at the earliest opportunity. Live updates CACHE RESOLVER PROTOCOL VALIDATION IRULES IPV4/V6 LISTENER RPZ live feed BIG-IP GTM REPUTATION DATABASE SPECIAL HANDLING © F5 Networks, Inc CONFIDENTIAL 27
  • 28. DNS IP and Name Reputation Choices RESPONSE POLICY ZONES INHIBITS THREATS BY FQDN IP INTELLIGENCE INHIBITS THREATS BY IP URL FILTERING Ingress DNS path Screens a DNS request against domains with a bad reputation. Any IP Protocol with iRules Intercept a DNS response in iRules. Categorize & make a decision. HTTP, HTTPS and DNS with iRules Intercept a DNS request in iRules. Categorize & make a decision. INHIBITS THREATS BY FQDN POLICY CONTROL BY FQDN © F5 Networks, Inc CONFIDENTIAL 28
  • 29. SP Layered Client Protection • Response Policy Zones (RPZ) filters out and provides NXDOMAIN / Redirect for know bad domains. • URL Filtering further provides granular policy controls using categories. • IP Intelligence blocks based on the resolved IP. • It can also be used in the data path for other protocols. QUERY: WWW.DOMAIN.COM RPZ Feed Subscriber Policy IPI Feed URL Feed iControl iQuery DNS iRules (Request / Response) CACHE RESOLVER RPZ URL Filtering DNS Request Path DNS Response Path IP Intelligence iRule EGRESS DNS PATH INGRESS DNS PATH © F5 Networks, Inc CONFIDENTIAL 29
  • 30. DNS Tunneling: Prevent it with iRules Client A Client B Client C Client D Client E Client F Suspend Threshold Drop Threshold Classify the traffic: Determine the SLA for RPS and allowed response size. When a client sends in a query: Is the query for a blocked domain? (A tunnel host) Is the query rate above allowed rate? Increment score. Client previously above allowed rate? Increment score. Resolve request and analyze response. - Factor in the response size to the score. Take an action: Is the client above the score threshold? - Drop the request - Suspend DNS service for a period. QUERY RATE SCORING RESPONSE SIZE SCORING © F5 Networks, Inc CONFIDENTIAL 30
  • 31. Key F5 network services – Optimize, Monetize, Secure A unified platform and single management framework Intelligent Traffic Steering Per-Subscriber Policy Enforcement CGNAT and IPv6 Migration URL Filtering ICSA Certified Network Firewall TCP Local DNS Optimization DPI & © F5 Networks, Inc CONFIDENTIAL 31
  • 32. Пересечение технологий Маршрутизатор F5 BIG-IP (пакетная обработка) (обработка на базе сессий) Балансировка NAT44 NAT64 DS-Lite Traffic steering Безопасность L4-L7 SSL и IPsec VPN Масштабирование и безопасность DNS Ускорение WEB L2 VPN L3 VPN Управление абонентами IP QoS IP пиринг 32 © F5 Networks, Inc. © F5 Networks, Inc CONFIDENTIAL 32
  • 33. Carrier Grade NAT (44, 64) NAT4(6)4 RTR Internet Публичное адресное пространство IPv4 / IPv6 PGW/GG VIPRION SN Частное адресное пространство NAT4(6)4 • Динамический NAPT, Deterministic NAPT, Port Block Allocation • Расширенные возможности ALG, hairpinning, поддержка EIF/EIM • Беспрецедентное масштабирование и производительность (Gbps, cps, max conns) • Высокопроизводительное логирование в любом требуемом формате (syslog, Netflow); возможно изменение формата полей, например добавление Radius ID, http Url и т.п. © F5 Networks, Inc CONFIDENTIAL 33
  • 34. Вопрос 1: Какое максимальное количество пакетов в секунду может быть в 1 Gbps канале? Ответ: ~1.488.096 пакетов в секунду в гигабитном канале © F5 Networks, Inc CONFIDENTIAL 34
  • 35. Вопрос 1: Какое максимальное количество пакетов в секунду может быть в 1 Gbps канале? Frame Part Minimum Frame Inter Frame Gap (9.6 ms) 12 bytes MAC Preamble (+ SFD) 8 bytes MAC Destination Address 6 bytes MAC Source Address 6 bytes MAC Type (or length) 2 bytes Payload (Network PDU) 46 bytes Check Sequence (CRC) 4 bytes Total Frame Physical Size 84 bytes [1,000,000,000 b/s / (84 B * 8 b/B)] == 1,488,096 f/s (maximum rate) Size © F5 Networks, Inc CONFIDENTIAL 35
  • 36. Вопрос 2: Какое максимальное значение CPS может быть достигнуто для 1Gbps канала? Ответ: ~1.488.096 Соединений в секунду Потому что каждый пакет может инициировать соединение (SYN, первый UDP пакет в сессии) © F5 Networks, Inc CONFIDENTIAL 36
  • 37. Вопрос 3: Сколько CPS может обработать межсетевой экран F5 Networks? Connections per second 8 6 4 2 0 Millions 400k 350k Juniper (SRX 5800) Cisco (ASA 5585-X) 600k Check Point (61000) 21x 8M F5 (VIPRION 4800) © F5 Networks, Inc CONFIDENTIAL 37
  • 38. Key F5 network services – Optimize, Monetize, Secure A unified platform and single management framework Intelligent Traffic Steering Per-Subscriber Policy Enforcement CGNAT and IPv6 Migration URL Filtering ICSA Certified Network Firewall TCP Local DNS Optimization DPI & © F5 Networks, Inc CONFIDENTIAL 38
  • 39. Mobile Has Unique Challenges Why is the web so slow on my mobile device? Mobile Device • TCP stacks are different on different mobile OS • JavaScript parsing and execution is relatively slow on mobile devices Mobile Network • Higher packet loss rate • High network latency: 300ms via 3G vs <50ms on LTE • Connections are made ad-hoc and frequently dropped to preserve spectrum and battery life Internet • Low packet loss rate • Low latency (except for intercontinental traffic) Application • Different TCP stacks being used on servers, some of which are not optimal for mobile networks © F5 Networks, Inc CONFIDENTIAL 39
  • 40. Content Optimization – A Changing Environment SSL / SPDY INCREASE • In many countries, SSL traffic (HTTPS and SPDY) on mobile networks is currently reaching around 50% of total Internet traffic • Top web sites such as Google, Facebook, and Twitter use SPDY • HTTP 2.0 being standardized in IETF with browsers requiring TLS encryption when setting up HTTP 2.0 connections RISE OF ADAPTIVE BIT RATE VIDEO STREAMING • Top video sites such as YouTube, Netflix, Hulu, and BBC iPlayer have all embraced ABR video technology • Video is encoded at different bit rates, client dynamically chooses or changes appropriate bit rate based on network conditions © F5 Networks, Inc CONFIDENTIAL 40
  • 41. TCP Protocol Review • TCP is a connection-oriented protocol • Client and server must establish a connection before any data can be transfered • TCP provides reliability • Knows that data it sends is correctly received by the other end • Acknowledgements confirm delivery of data received by TCP receiver • Ack for data sent only after data has reached receiver • TCP implements flow control and congestion control • Sender can not overwhelm a receiver with data • Sender will "back off" when under congestion © F5 Networks, Inc CONFIDENTIAL 41
  • 42. Impact of Latency – Web Page Load Times Source: Ilya Grigorik, Google © F5 Networks, Inc CONFIDENTIAL 42
  • 43. Impact of Packet Loss – Throughput Degradation • TCP designed to probe the network to figure out available capacity • TCP slow start is a feature, not a bug Avg HTTP response size 16 kB (3 round trips) In mobile networks packet loss does not necessarily imply congestion Source: Ilya Grigorik, Google © F5 Networks, Inc CONFIDENTIAL 43
  • 44. TCP Optimization with F5 High Goodput Minimal Buffer Flow Fairness Bloat VIPRION Origin Server INTERNET PGW/ GGSN RTR 2G/3G LTE Mobile Client TCP EXPRESS Cell-optimized TCP stack WAN-optimized TCP stack © F5 Networks, Inc CONFIDENTIAL 44
  • 45. TCP Congestion Control Algorithms • Loss-based algorithms • Reno, New Reno, High-Speed, Scalable, BIC, CUBIC • Delay-based algorithms • Vegas • Bandwidth-estimating algorithms • Westwood, Westwood+ • Hybrid delay/loss algorithms • Illinois, Woodside (F5) RENO CUBIC ILLINOIS © F5 Networks, Inc CONFIDENTIAL 45
  • 46. TCP Congestion Control Algorithms in 3G and LTE TCP Woodside • F5 created algorithm. • Hybrid loss and latency based algorithm. • Minimizes buffer bloat by constantly monitoring network buffering. TCP Vegas • Emphasizes packet delay rather than packet loss • Detects congestion based on increasing RTT values of packets. TCP Illinois • Targeted at high speed long distance networks • Loss-delay based algorithm. • Primary congestion of packet loss determines direction of window size change. • Secondary congestion of queuing delay determines the pace of window size changes. H-TCP • Targeted for high speed networks with high latency. • Loss-based algorithm. © F5 Networks, Inc CONFIDENTIAL 46
  • 47. TCP tuning for mobile networks • Mobile networks have a large BDP • Tune your TCP buffers accordingly • Mobile networks can exhibit random packet loss • Choose a TCP congestion control algorithm/technique that takes this into account (don’t get into slow start upon random packet loss) • Mobile networks can suffer from buffer bloat issues • Choose a TCP congestion control algorithm that does not rely solely on packet loss • Enable TCP rate shaping to ensure ‘smoother’ delivery packets (less strain on buffers) • Mobile networks have relatively high latency • Tune your settings to increase performance and web page load times (window size, initial congestion window, ... ) © F5 Networks, Inc CONFIDENTIAL 47 • Real life mobile performance is very ‘variable’ – room for market
  • 48. Reducing Web Page Load Times with F5 TCP Express Real life test results – MNO in APAC Business center Shopping Mall Residential Area Business center Shopping Mall Case 1 – 100 * 64KB images Case 2 – 1 * 10MB image Residential Area Business center Shopping Mall Residential Area Case 3 – Regular website 1 Case 4 – Regular website 2 Business center Shopping Mall Residential Area Optimized (sec) As-is (sec) Improvement (%) © F5 Networks, Inc CONFIDENTIAL 48
  • 49. HTTP Performance Tests – Radio Strength Variances Real life test results – MNO in EMEA 200% 180% 160% 140% 120% 100% 80% 60% 40% 20% 0% 3G 4G HTTP large download HTTP small download 196% 95% 22% 14% Poor coverage Good coverage Large download: HTTP page with large images (throughput test) Small download: HTTP page with small objects (web browsing test) 40% 35% 30% 25% 20% 15% 10% 5% 0% HTTP large download HTTP small download 38% 33% 20% 28% Poor coverage Good coverage TCP OPTIMIZATION BENEFITS INCREASE UNDER POOR RADIO COVERAGE © F5 Networks, Inc CONFIDENTIAL 49
  • 50. TCP Optimization – Summary Increases “goodput” on radio network and keeps latency under control Works for > 90% of all Internet traffic regardless of encryption or encoding Lengthens life span of radio infrastructure and enhances user experience Deployed inline on Gi LAN, optionally consolidated with other L4-7 functions © F5 Networks, Inc CONFIDENTIAL 50
  • 51. To stay in touch please join our LinkedIn Group! © F5 Networks, Inc CONFIDENTIAL 51

Editor's Notes

  1. F5’s Intelligent Services Platform can be deployed across an array of hardware or software choices designed to address different application needs, deployment scenarios, and resource requirements in the data center. Hardware designed specifically for application delivery Industry’s best performance—up to 20M L7 RPS and 640 Gbps throughput Ultra reliable, long life components Compliance options—FIPS, Common Criteria, NEBS Always-on management Hardware SSL offload and compression
  2. This RQ implements enhancements to the PEM URL filtering feature developed in the Vancouver release. The key enhancement is the addition of a custom URL database that can be leveraged for adding custom URLs, categories for the operator. The feature also provides the ability to leverage the server name indication (SNI) in SSL traffic for URL categorization, this is available via an irule hook. Categorize URLs based on the server name indication information in the SSL connection.
  3. Uses the rewrite engine at the backend. Compressed content handling.
  4. Local DNS, in three flavors, is used by the SP to service the end subscribers when their handsets or devices perform a DNS query. The LDNS is responsible for responding with an answer to a domain query. In a resolver mode, F5 BIG-IP can traverse the root name servers of the internet to retrieve the response and then cache it once found. The F5 implementation is very high performance, meaning that one F5 BIG-IP can replace 10s or 100s of traditional DNS servers. However, some customers may have existing infrastructure they may wish to keep, at least initially. In such a case F5 can load balance to them or, for even higher performance, perform as a transparent cache. This latter solution has almost no impact operationally. In all of these scenarios, F5 technology protects the infrastructure through its built in ICSA certified firewall. If run in an authoritative mode, this is where the F5 BIG-IP acts as a nameserver that is authoritative for a given zone (domain). This is used, for example, for sites a customer might use for billing, device activity etc. This may be combined with GSLB for high availability. The infrastructure play for F5 DNS is where BIG-IP is being used in the core of the network for connection setup and other functions. For example, in HSDPA networks, a connection is made to a packet gateway (GGSN) on behalf of the mobile device when it makes a data connection. The selection of that gateway can be performed intelligently by monitoring the health of those gateways and through GSLB only responding with an IP address of a gateway which is able to take the connection. This type of function today may be performed through a combination of iRules and monitors.
  5. Clients will now only ever reach the DNS Server if the DNS request they are making has expired or is for a name that has not been requested before. By having a high performance cache, this allows existing DNS resolver servers to scale further as they are receiving less load. This is a low impact installation scenario as the client and server are unchanged in behavior, only the scalability of DNS increases. And of course, this is combined with load balancing to the DNS servers with a built in ICSA certified firewall, consolidating resources while increasing security.
  6. This last step for LDNS now eliminates the need for the DNS servers altogether. F5 provides full resolving out to the internet for all DNS requests. It can do this with high performance in combination with caching. This step consolidates infrastructure further but having all of the components built into one box. Furthermore, high availability for this type of installation (or any of the footprints mentioned so far) can be performed by deploying F5 DNS with HA enabled in a device pair.
  7. To provide the best subscriber QoE, your ideal TCP stack would do a few things for you. It would promote high goodput so that you are always maximizing the amount of data being pushed through your network that is relevant to your subscriber. The higher your goodput, the faster your subscribers get the information they want. It would minimize buffer bloat so you can reduce congestion before it even starts. Buffer bloat is a sign of far too much traffic on a network that can’t handle it, leading to increased delays of your data being sent to your subscribers. Minimizing buffer bloat means less delay which means faster performance for your subscribers. And finally, it would keep fairness between your flows so no one flow gets dropped. A dropped flow leads to the lowest form of subscriber QoE, thus keeping all flows alive is the best scenario. These three characteristics: high goodput, minimal buffer bloat, and flow fairness, would all work together to optimize your network and your subscribers’ QoE.
  8. Woodside is an F5 proprietary congestion control routine. Results are for preliminary code on simulated networks 3G test was 4 Mbps, 1% loss, 400 ms RTT, 128 KB router buffer LTE test was 45 Mbps, 0.1% loss, 20 ms RTT, 8 MB router buffer