Service Providers trends & F5 Networks SP s portfolio overview

Size: px
Start display at page:

Download "Service Providers trends & F5 Networks SP s portfolio overview"

Transcription

1 Service Providers trends & F5 Networks SP s portfolio overview

2 Attacks from Internet Data Growth / IoT Regulations / Services DDoS protection L4-L7 security Traffic shaping Scalability, IPv4/v6 Traffic policing URL filtering Network Consolidation Competition, Profitability Today s ISP trends F5 Networks, Inc 2

3 Loadbalancing LTM Web FW ASM CGNAT IPv4, IPv6 Network FW AFM DNS DNS Traffic policing PEM Cloud scrubbing Silverline Signalling proxy Diameter, SIP, Radius, HTTP, LDAP, What F5 does for SPs? Access Control APM F5 Networks, Inc 3

4 PEM CGNAT DNS Silverine TMOS Full proxy architecture irules Programibility Analytics Statistics, logs,... IPv6 Native support Power HW Community devcentral.f5.com Virtualisation vcmp, VMware, Openstack, and our TREASURES under the surface F5 Networks, Inc 4

5 PEM F5 Networks, Inc 5

6 Context-Aware and Policy-Driven Traffic Steering What is context? SUBSCRIBER APPLICATION RAT TYPE 2G 3G 4G LOCATION DEVICE TYPE CONGESTION How does the steering platform learn about context? PCRF Diameter Gx GGSN/PGW RADIUS 3RD PARTY TOOLS Custom API DATA PLANE PEM/DPI Module F5 Networks, Inc 6

7 Subscriber awareness with PEM OCS AAA Radius PCRF Gy Gx Radius PGW/ GGSN/ BNG RTR Data Internet Data Center Video Optimization Transparent Caching Parental Controls WAP Gateway F5 Networks, Inc 7

8 PEM for Fixed Line / WiFi Policies and Subscribers Detection and identification using DHCP DHCP AAA Syslog Subscriber identity extracted from DHCP Option 82 (IPv4) / Option 37 (IPv6) Support of DHCP snooping / DHCP relay DHCP, Radius Fixed Broadband BRAS /BNG RTR BIG-IP PEM Internet Detection and Authentication using Radius PEM as Radius client initiates Access- Request for particular subscriber Radius Accounting for the reporting F5 Networks, Inc 8

9 Policy Action: Traffic Steering and Service Chaining Use Case: Ability to steer traffic through different value added services and network elements Intelligent traffic steering to VAS servers Service Provider VAS Video Optimization Parental Control Control Plane PCRF AAA Leverage subscriber/application awareness for steering Steering on Response Analyze response and apply steering policy for flow/ transaction Emma John Subscriber http http (3G) GGSN PGW BNG Radius Paul User Service Policy John Paul Video Optimization LTE bypass Parental Control No Video Optimization Always Parental Control Yes Radius Diameter Gx Other API In ternet Customer Benefit: A fixed or mobile solution for optimizing subscriber and application traffic through VAS and network elements based on subscriber profile F5 Networks, Inc 9

10 Bandwidth and QoE management PER-SUBSCRIBER BANDWIDTH CONTROL Gold Subscriber (20 Mbps) Silver Subscriber (10 Mbps) Bronze Subscriber (5 Mbps) PCRF PGW/GGSN VIPRION PER-SUBSCRIBER PER APPLICATION BANDWIDTH CONTROL Gold Subscr total (20 Mbps) Even if subscriber is entitled for more by subscriber bandwidth policy his P2P traffic gets reduced to configured value (512kbps) Gold Subscr p2p (512 kbps) App p2p total (500 Mbps) PGW/GGSN VIPRION

11 URL Categorization for filtering & parental control URL Filtering Custom [irule] Built-in Webroot DB (20M most popular) Cloud-based Webroot (400M) DB lookup Custom DB (few M) SNI based URL categorization for HTTPs 1. Trying to access blocked URL PGW/ GGSN RTR 3. Access Denied 2. Integrated Webroot URL Filtering / Blacklist Internet F5 Networks, Inc 11

12 Application Classification : DPI engine OTT MONETIZATION & FLEXIBLE CHARGING PCRF Analytics Gold Subscr total (acct only) OTT Service (acct + DSCP mark) Gx Syslog/IPFIX PGW/GGSN RADIUS Accounting (Subscriber discovery) VIPRION SPECIALIZED SERVICE (MNO BRAND) Subscription models / bundles for OTT or specialized service Bundled into subscription for a lower fee OTT traffic excluded from volume bundle OTT traffic marked/tagged for differential treatment at radio layer

13 Classification: Encrypted traffic handling HTTPS/SSL SNI /Common name based classification Support for behavioral classification Pattern based matching, signature creation SSL certificate lookup (domain string lookup inside SSL) SSL flow bundling ability to correlate parent/child SSL flows for an application/protocol partial SSL handshake scenario where parent flow certificate is not transmitted to child SSL Non-HTTPS (Skype, BitTorrent, ) Support for pattern based signatures along with behavioral capabilities For example, Skype - source IP/port, supernodes etc. F5 Networks, Inc 13

14 Content Insertion CONTENT INJECTION / AD INSERTION 1. Content being sent back to subscriber; data maxed out 3. Subscriber realizes they have maxed out data BNG/BRAS 2. Javascript insertion about quota max Internet HTTP header enrichment for subscriber identification Content insertion (javascript) into HTTP payload to enable In-browser notifications Toolbar insertion Ad insertion F5 Networks, Inc 14

15 HTTP Header Enrichment 1. Subscriber sends HTTP request GGSN/PGW BNG/BRAS 2. BIGIP intercepts HTTP request and adds custom header based on pre-configured policy Internet HTTP Full-Proxy mode allows for Header insertion both in request and response Custom header name completely configurable Clear-text and hashed/encrypted header content Conditions to decide when to insert header fully configurable, example Based on destination IP address, URI, (list of destinations) Based on user-id (under PCRF control) F5 Networks, Inc 15

16 Classification: Mobile device and Tethering detection Reports Device-Type & OS for each subscribers Identifies the type of Mobile device connected to the network. Uses the Mobile device s (unique) Type Allocation Code (TAC) retrieved from RADIUS Acct START The Service Provider can use it s own database provisioned on Big-IP platform Determined by parsing the UA string Determined by TCP Fingerprinting Tethering Ability to detect tethering based on TTL today In next release Ability to detect tethering based on enhanced algorithms like TCP fingerprints, UA, #Connections, BW etc. F5 Networks, Inc 16

17 Charging/Quota Management Quota Management / Pre-paid charging use cases per Sub / App Gy AVPs / Volume and time based quotas / quota replenishment / quota breach License based Gx / Gy Policy and Subscriber Management OCS PCRF AAA/HSS PGW/ GGSN RTR BIG-IP PEM Internet F5 Networks, Inc 17

18 F5 Approach to reporting/analytics/logging F5 provide on Box reporting to show local analytics Approach to external analytics is to provide the information to external 3 rd parties vendors implementing this function F5 data export can be done leveraging on different protocols F5 has partnership with several vendors for analytics SYSLOG IPFIX RADIUS GX PGW/ GGSN RTR BIG-IP PEM Internet F5 Networks, Inc 18

19 PEM Wide range of use cases Per-subscriber Application & URL Bandwidth Control & Filtering TCP-friendly rate limiter Separate up/down rates Highly scalable solution TCP Optimization as a bonus Subscriber Application Analytics Subscriber ID / Rate Plan Charging rules Application Usage Reporting Intelligent Traffic Steering & Service Chaining to VAS Steer traffic based on subscriber profile to Value Added Services & Optimization Services Intelligent Service Chaining Online Charging (Gy) Flexible rating group definitions based on applications and/or URI Redirect or block upon quota expiration URL Filtering & Parental Control Government lists Per-subscriber parental control opt-in/opt-out service For HTTP & HTTPS OTT Identification & Monetization Per-subscriber OTT application detection Per-OTT bandwidth, marking and charging rules Header Enrichment & WAP offload HTTP HE for content-based charging WAP GW bypass/offload and replacement Content Injection / Toolbars Java-script based content injection Targeted advertisements Lightweight BRAS/BNG DHCP-based BNG model for wifi and wireline deployments Radius AAA client F5 Networks, Inc 19

20 Case study Tier1 operátor v Polsku Rodičovská Kontrola PEM Mobile Client Access Network ICAP calls Gx INTERNET Scenár nasadenia - Rodičovská kontrola ako platená služba - Riešenie tiež pre business zákazníkov - Whitelisting on-line bankingov - Load balancing ICAP serverov Symantec DB PCRF RIEŠENIE F5 - PEM s integráciou Gx do Optenet PCRF - Reportovanie vadných URL pomocou ICAP - irules pre detekciu SNI z SSL prevádzky

21 Case study Poskytovateľ DSL a VoIP služieb LTM & PEM & AFM Mobile Client Access Network INTERNET - Scenár nasadenia - SIP Load balancer / proxy - Inteligentný traffic shaping - Carrier-grade Firewall SIP 1 SIP 2 PRÍNOSY - Úspora US$150,000 na CAPEX (konkurenčné riešenie US$250,000) - Úspory na OPEX - konsolidácia (správa, trénink)

22 DNS AFM CONS CGNAT Consolidate with F5 Networks, Inc 22

23 Consolidating SP s security BEFORE F5 Firewall Network DDoS Application DDoS Web Access Management Load Balancer DNS Security Load Balancer & SSL Web Application Firewall WITH F5 Consolidation of firewall, application security, and traffic management Protection for networks and applications Fewer devices translates to lower latency for subscribers

24 Consolidating SP s security BEFORE F5 Firewall Network DDoS Application DDoS Web Access Management Load Balancer DNS Security Load Balancer & SSL Web Application Firewall WITH F5 Consolidation of firewall, application security, and traffic management Protection for networks and applications Fewer devices translates to lower latency for subscribers

25 Consolidating SP s service functions BEFORE F5 PGW/ GGSN DPI, Parental Control, CG-NAT Firewall WITH F5 Consolidation of security, address, and traffic management Protection for mobility and core infrastructure with user awareness High scale for the demands of 4G and IPv6 deployments

26 Consolidating SP s service functions BEFORE F5 PGW/ GGSN DPI CG-NAT Firewall WITH F5 PGW/ GGSN Consolidation of security, address, and traffic management Protection for mobility and core infrastructure with user awareness High scale for the demands of 4G and IPv6 deployments

27

RE-ARCHITECTING THE GI LAN OPTIMIZE & MONETIZE MOBILE BROADBAND. Bart Salaets Solution Architect

RE-ARCHITECTING THE GI LAN OPTIMIZE & MONETIZE MOBILE BROADBAND. Bart Salaets Solution Architect RE-ARCHITECTING THE GI LAN OPTIMIZE & MONETIZE MOBILE BROADBAND Bart Salaets Solution Architect Today s Gi LAN is static and inflexible DNS PCRF AAA OCS CSCF RADIUS, Diameter, DNS, SIP Control Plane Services

More information

Traffic Steering & Service Chaining

Traffic Steering & Service Chaining Traffic Steering & Service Chaining Optimize & Monetize with PEM Bart Salaets Solution Architect Agenda F5 Gi LAN Strategy Traffic Steering & Service Chaining Recent Evolutions Policy-Based Per-Flow and

More information

IPv6 implementation aspects in the operator s environment. Grzegorz Kornacki F5 Field Systems Engineer

IPv6 implementation aspects in the operator s environment. Grzegorz Kornacki F5 Field Systems Engineer IPv6 implementation aspects in the operator s environment Grzegorz Kornacki F5 Field Systems Engineer Exposing applications & services to IP v6 Exposing applications / services to IP v6 Facebook has already

More information

IPv6 migration strategies for mobile networks

IPv6 migration strategies for mobile networks migration strategies for mobile s White paper To cope with the increasing demand for IP addresses, most mobile operators (MNOs) have deployed Carrier Grade Network Address Translation (CG-NAT). Introducing

More information

Leverage SDN Principles in LTE to Meet Future Network Demands

Leverage SDN Principles in LTE to Meet Future Network Demands Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network

More information

DESIGNING VALUE ADDED SERVICES IN WIRELINE NETWORKS. Norbert Wicker, EMEA Advanced Technology Specialist 8 th September 2012

DESIGNING VALUE ADDED SERVICES IN WIRELINE NETWORKS. Norbert Wicker, EMEA Advanced Technology Specialist 8 th September 2012 DESIGNING VALUE ADDED SERVICES IN WIRELINE NETWORKS Norbert Wicker, EMEA Advanced Technology Specialist 8 th September 2012 OVERVIEW 2 Copyright 2012 Juniper Networks, Inc. www.juniper.net SERVICE DELIVERY

More information

A Practical Approach to IPv6

A Practical Approach to IPv6 A Practical Approach to IPv6 Vietnam IPv6 Day Boonchareon Chong Global Solution Architect - Service Provider Boon@f5.com The move to IPv6 The Data Tsunami in Service Providers and Enterprises IP Everything

More information

Enabling Agile Service Chaining with Service Based Routing

Enabling Agile Service Chaining with Service Based Routing Enabling Agile Service Chaining with Service Based Routing Contents Abstract...1 1. Introduction...1 2. Huawei s SBR Solution for Agile Service Chaining...3 2.1. Architecture Overview...3 2.2. Multi-Dimensional

More information

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. INTRODUCTION F5 has innovated to help operators by embracing virtualization for the key elements of its portfolio, and

More information

Solutions Guide. F5 solutions for the emerging 5G landscape

Solutions Guide. F5 solutions for the emerging 5G landscape Solutions Guide F5 solutions for the emerging 5G landscape 1 F5 Solutions for the emerging 5G landscape. Access Network Control Plane Cloud Mobile Edge and Core Analytics DNS EPC & IMS DDoS Mobile Access

More information

OVERVIEW. Virtual Solutions for Your NFV Environment

OVERVIEW. Virtual Solutions for Your NFV Environment Contents Introduction 3 Build a Virtualized Network with F5 s 4 Virtual Firewall (vfw) 4 Virtual CGNAT (vcgn) 4 Virtual Policy Charging Enforcement Function (vpcef) 4 Virtual Content Insertion (vci) 4

More information

The F5 Handbook for Service Providers

The F5 Handbook for Service Providers Guide The F5 Handbook for Service Providers VERSION 2, REVISED 2018 Table of Contents Security Solutions 4 S/Gi Firewall 4 Carrier-Grade NAT 6 Secure DNS 8 VoLTE and IMS Security 10 Data Center Firewall

More information

IPv6 Community Wifi. Unique IPv6 Prefix per Host. IPv6 Enhanced Subscriber Access for WLAN Access Gunter Van de Velde Public.

IPv6 Community Wifi. Unique IPv6 Prefix per Host. IPv6 Enhanced Subscriber Access for WLAN Access Gunter Van de Velde Public. IPv6 Community Wifi Unique IPv6 Prefix per Host IPv6 Enhanced Subscriber Access for WLAN Access Gunter Van de Velde 19-01-2016 1 Nokia 2016 Public IPv6 timeline 4 waves as noticed by ALU IP Division ~2000

More information

F5 Synthesis Information Session. April, 2014

F5 Synthesis Information Session. April, 2014 F5 Synthesis Information Session April, 2014 Agenda Welcome and Introduction to Customer Technology Challenges Software Defined Application Services Reference Architectures for Today s Customer Challenges

More information

BIG-IP Access Policy Manager : Implementations. Version 12.1

BIG-IP Access Policy Manager : Implementations. Version 12.1 BIG-IP Access Policy Manager : Implementations Version 12.1 Table of Contents Table of Contents Web Access Management...11 Overview: Configuring APM for web access management...11 About ways to time out

More information

Software Defined Broadband Networks. Jon Mischel Director, Product Management

Software Defined Broadband Networks. Jon Mischel Director, Product Management Software Defined Broadband Networks Jon Mischel Director, Product Management This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.

More information

Cisco Quantum Policy Suite for Mobile

Cisco Quantum Policy Suite for Mobile Data Sheet Cisco Quantum Policy Suite for Mobile The Cisco Quantum Policy Suite for Mobile is a proven carrier-grade policy, charging, and subscriber data management solution that enables service providers

More information

Configuring F5 for SSL Intercept

Configuring F5 for SSL Intercept Configuring F5 for Welcome to the F5 deployment guide for configuring the BIG-IP system for SSL intercept (formerly called with Air Gap Egress Inspection). This document contains guidance on configuring

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 12.1

BIG-IP Access Policy Manager : Secure Web Gateway. Version 12.1 BIG-IP Access Policy Manager : Secure Web Gateway Version 12.1 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...11 About Secure Web Gateway for web access...11 About the benefits

More information

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

BIG-IP System: Implementing a Passive Monitoring Configuration. Version 13.0

BIG-IP System: Implementing a Passive Monitoring Configuration. Version 13.0 BIG-IP System: Implementing a Passive Monitoring Configuration Version 13.0 Table of Contents Table of Contents Configuring the BIG-IP System for Passive Monitoring...5 Overview: Configuring the BIG-IP

More information

The F5 Handbook for Service Providers. 24 Use Cases to Secure, Optimize, and Monetize Your Network

The F5 Handbook for Service Providers. 24 Use Cases to Secure, Optimize, and Monetize Your Network The F5 Handbook for Service Providers 24 Use Cases to Secure, Optimize, and Monetize Your Network Table of Contents Security Solutions 4 S/Gi Firewall 4 Carrier-Grade NAT 6 Intelligent DNS Firewall 8 VoLTE

More information

Cisco Service Control Overview

Cisco Service Control Overview CHAPTER 1 This chapter provides a general overview of the Cisco Service Control solution. It introduces the Cisco service control concept and capabilities. It also briefly describes the hardware capabilities

More information

Providing Secure, Fast and Available

Providing Secure, Fast and Available Providing Secure, Fast and Available SharePoint with F5 BIG-IP John Lee, Federal Systems Engineer Version 3.0 Rate Shaping TCP Express SSL Caching XML Compression OneConnect TCP Express ASM Web Accel 3

More information

IP Services Gateway Overview

IP Services Gateway Overview This chapter provides an overview of the IP Services Gateway (IPSG) product. This chapter covers the following topics: Introduction, page 1 How it Works, page 2 In-line Services, page 4 Enhanced Feature

More information

Subscriber Data Correlation

Subscriber Data Correlation Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service

More information

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer 1 BIG-IP APM: Access Policy Manager v11 David Perodin Field Systems Engineer 3 Overview What is BIG-IP Access Policy Manager (APM)? How APM protects organization-facing applications by providing policy-based,

More information

Czas na nowe platformy sprzętowe F5! Dlaczego są to najbardziej programowalne urządzenia ADC na rynku

Czas na nowe platformy sprzętowe F5! Dlaczego są to najbardziej programowalne urządzenia ADC na rynku Czas na nowe platformy sprzętowe F5! Dlaczego są to najbardziej programowalne urządzenia ADC na rynku Maciej Iwanicki, Systems Engineer m.iwanicki@f5.com SOFTWARE & PLATFORM LIFECYCLE F5 Software Lifecycle

More information

BIG-IP Network Firewall: Policies and Implementations. Version 13.0

BIG-IP Network Firewall: Policies and Implementations. Version 13.0 BIG-IP Network Firewall: Policies and Implementations Version 13.0 Table of Contents Table of Contents About the Network Firewall...9 What is the BIG-IP Network Firewall?...9 About firewall modes... 9

More information

PCC (Policy and Charging Control) In Mobile Data. EFORT

PCC (Policy and Charging Control) In Mobile Data. EFORT PCC (Policy and Charging Control) In Mobile Data EFORT http://www.efort.com By implementing policy and charging control (PCC) procedures in their mobile data network, mobile service providers are able

More information

86% of websites has at least 1 vulnerability and an average of 56 per website WhiteHat Security Statistics Report 2013

86% of websites has at least 1 vulnerability and an average of 56 per website WhiteHat Security Statistics Report 2013 Vulnerabilities help make Web application attacks amongst the leading causes of data breaches +7 Million Exploitable Vulnerabilities challenge organizations today 86% of websites has at least 1 vulnerability

More information

BIG-IP V11.3: PRODUCT UPDATE. David Perodin Field Systems Engineer III

BIG-IP V11.3: PRODUCT UPDATE. David Perodin Field Systems Engineer III BIG-IP V11.3: PRODUCT UPDATE David Perodin Field Systems Engineer III Contents V11.3 Product Update 1. BIG-IP v.11.3.0 (Local Traffic Manager & Access Policy Manager) 2. Advanced Firewall Module (AFM)

More information

Information About the Cisco Service Control Concept

Information About the Cisco Service Control Concept CHAPTER 1 General Overview Revised: April 19, 2010, Introduction This chapter provides a general overview of the Cisco Service Control solution. It introduces the Cisco Service Control concept and the

More information

Architecture: Consolidated Platform. Eddie Augustine Major Accounts Manager: Federal

Architecture: Consolidated Platform. Eddie Augustine Major Accounts Manager: Federal Architecture: Consolidated Platform Eddie Augustine Major Accounts Manager: Federal Current DoD Situation Stovepipes of Technology icontrol Customization irules Solutions Security Access Availability Load

More information

Stateless 4V6. draft-dec-stateless-4v6. September 2011

Stateless 4V6. draft-dec-stateless-4v6. September 2011 Stateless 4V6 draft-dec-stateless-4v6 September 2011 1 Operator s have an IPv6 network in production Limited Public IPv4 or exhausted Desire/intent to move to fully to IPv6 (at least operationally) End

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

O365 Solutions. Three Phase Approach. Page 1 34

O365 Solutions. Three Phase Approach. Page 1 34 O365 Solutions Three Phase Approach msfttechteam@f5.com Page 1 34 Contents Use Cases... 2 Use Case One Advanced Traffic Management for WAP and ADFS farms... 2 Use Case Two BIG-IP with ADFS-PIP... 3 Phase

More information

Securing LTE Networks What, Why, and How

Securing LTE Networks What, Why, and How Securing LTE Networks What, Why, and How As security threats evolve, service providers must implement comprehensive security for both their LTE network infrastructures and connected devices to protect

More information

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics Vision: Everything as a service Speed Scalability Speed to Market

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache

More information

Service Automation Made Easy

Service Automation Made Easy Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their

More information

Video Quality Management Guidebook

Video Quality Management Guidebook Video Quality Management Guidebook Strategies for traffic optimization CASE STUDY GUIDE BOOK Video trends Both mobile and fixed data networks are experiencing a rise in video traffic which already represents

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

A Leading Internet Business Enabler

A Leading Internet Business Enabler A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My guests are bringing too many devices into my network. How do I manage them? I allow my

More information

Cisco Access Policy Server

Cisco Access Policy Server Data Sheet Cisco Access Policy Server The Cisco Access Policy Server is a fully virtualized, carrier-grade network discovery, selection, and authentication solution. It uses the Cisco Policy Suite policy,

More information

BIG-IP Analytics: Implementations. Version 12.0

BIG-IP Analytics: Implementations. Version 12.0 BIG-IP Analytics: Implementations Version 12.0 Table of Contents Table of Contents Legal Notices...5 Legal notices...5 Setting Up Application Statistics Collection...7 What is Analytics?...7 About Analytics

More information

Full-MVNx enrollment approaches for different target strategies. CTO Summer Summit St. Petersburg,

Full-MVNx enrollment approaches for different target strategies. CTO Summer Summit St. Petersburg, Full-MVNx enrollment approaches for different target strategies CTO Summer Summit St. Petersburg, 2-3.06.16 Full-MVNx Advantages Independence and Simplicity No changes in MNO functioning required; no impact

More information

MONETIZE OVER-THE-TOP MOBILE APPLICATIONS ALCATEL-LUCENT MOBILE APPLICATION ASSURANCE ON THE 7750 SERVICE ROUTER MOBILE GATEWAY APPLICATION NOTE

MONETIZE OVER-THE-TOP MOBILE APPLICATIONS ALCATEL-LUCENT MOBILE APPLICATION ASSURANCE ON THE 7750 SERVICE ROUTER MOBILE GATEWAY APPLICATION NOTE MONETIZE OVER-THE-TOP MOBILE APPLICATIONS ALCATEL-LUCENT MOBILE APPLICATION ASSURANCE ON THE 7750 SERVICE ROUTER MOBILE GATEWAY APPLICATION NOTE ABSTRACT Mobile telecommunications was a lot easier when

More information

BIG-IP CGNAT: Implementations. Version 13.0

BIG-IP CGNAT: Implementations. Version 13.0 BIG-IP CGNAT: Implementations Version 13.0 Table of Contents Table of Contents Deploying a Carrier Grade NAT... 9 Overview: The carrier-grade NAT (CGNAT) module... 9 About ALG Profiles...10 About CGNAT

More information

A Leading Internet Business Enabler

A Leading Internet Business Enabler A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My hotel guests are bringing too many devices into my network. How do I manage them? I allow

More information

jetnexus Virtual Load Balancer

jetnexus Virtual Load Balancer jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and

More information

jetnexus Virtual Load Balancer

jetnexus Virtual Load Balancer jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and

More information

DevCentral Basics: Application Delivery Services PRESENTED BY:

DevCentral Basics: Application Delivery Services PRESENTED BY: DevCentral Basics: Application Delivery Services PRESENTED BY: Networking Concepts Physical/Virtual NICs VLANs and VLAN Groups Untagged and Tagged Interfaces Self IPs (local / floating) Routes are just

More information

Sichere Applikations- dienste

Sichere Applikations- dienste Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es

More information

Intel Network Builders Solution Brief. Etisalat* and Intel Virtualizing the Internet. Flexibility

Intel Network Builders Solution Brief. Etisalat* and Intel Virtualizing the Internet. Flexibility Intel Network Builders Solution Brief Etisalat* and Intel Virtualizing the Internet Gateway Gi-LAN for Service Flexibility Introduction Etisalat Group* is one of the world s leading telecom groups in emerging

More information

SSL INSIGHT SSL ENCRYPTION CHALLENGES SSL USE EXPOSES A BLIND SPOT IN CORPORATE DEFENSES SOLUTION BRIEF UNCOVER HIDDEN THREATS IN ENCRYPTED TRAFFIC

SSL INSIGHT SSL ENCRYPTION CHALLENGES SSL USE EXPOSES A BLIND SPOT IN CORPORATE DEFENSES SOLUTION BRIEF UNCOVER HIDDEN THREATS IN ENCRYPTED TRAFFIC SOLUTION BRIEF UNCOVER HIDDEN THREATS IN ENCRYPTED TRAFFIC SSL ENCRYPTION CHALLENGES To prevent attacks, intrusions and malware, enterprises need to inspect incoming and outgoing traffic for threats. Unfortunately,

More information

Dynamic Orchestration & Operation of Chained Network Services

Dynamic Orchestration & Operation of Chained Network Services Dynamic Orchestration & Operation of Chained Network Services Sam Aldrin Huawei Technologies www.isocore.com/sdn-mpls 1 Agenda SFC Orchestration and Operation Architecture & Solution Summary 2 Key challenges

More information

Management and Orchestration with F5 BIG-IQ 4.5. Philippe Bogaerts F5 Networks

Management and Orchestration with F5 BIG-IQ 4.5. Philippe Bogaerts F5 Networks Management and Orchestration with F5 BIG-IQ 4.5 Philippe Bogaerts F5 Networks F5 Synthesis High-Performance Services Fabric Simplified Business Models F5 Networks, Inc 2 BIG-IQ in the Synthesis Framework

More information

Cloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer

Cloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer Cloud, SDN and BIGIQ Philippe Bogaerts Senior Field Systems Engineer Virtual Editions TMOS/LTM 12.0 Highlights 1 NIC support Azure Marketplace Kernel Independent driver Enhanced Hypervisor support F5 Networks,

More information

SAS and F5 integration at F5 Networks. Updates for Version 11.6

SAS and F5 integration at F5 Networks. Updates for Version 11.6 SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify

More information

Brocade and Sandvine. Detailed Insights for OTT Application Traffic KEY BENEFITS SOLUTIONS BRIEF BUSINESS CHALLENGE

Brocade and Sandvine. Detailed Insights for OTT Application Traffic KEY BENEFITS SOLUTIONS BRIEF BUSINESS CHALLENGE Brocade and Sandvine Detailed Insights for OTT Application Traffic Brocade Packet Broker together with Sandvine s PacketLogic TM Deep Packet Inspection (DPI) engine is targeted towards mobile service provider

More information

Brocade and Procera. Detailed Insights for OTT Application Traffic KEY BENEFITS SOLUTIONS BRIEF BUSINESS CHALLENGE

Brocade and Procera. Detailed Insights for OTT Application Traffic KEY BENEFITS SOLUTIONS BRIEF BUSINESS CHALLENGE Brocade and Procera Detailed Insights for OTT Application Traffic Brocade Packet Broker together with Procera s PacketLogic TM Deep Packet Inspection (DPI) engine is targeted towards mobile service provider

More information

Overview of GPRS and UMTS

Overview of GPRS and UMTS CHAPTER 1 This chapter briefly introduces the 2.5G General Packet Radio Service (GPRS) and the 3G Universal Mobile Telecommunications System (UMTS) technologies, and their implementation in Cisco Gateway

More information

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description March 22, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

Distil Networks & F5 Networks Integration Guide

Distil Networks & F5 Networks Integration Guide INTEGRATIONGUIDE Distil Networks & F5 Networks Integration Guide (w) www.distilnetworks.com (e) sales@distilnetworks.com (US) 415.423.0831 (UK) +44.203.3184751 Table of Contents INTRODUCTION 3 F5 LTM 4

More information

BIG-IP CGNAT: Implementations. Version 12.1

BIG-IP CGNAT: Implementations. Version 12.1 BIG-IP CGNAT: Implementations Version 12.1 Table of Contents Table of Contents Deploying a Carrier Grade NAT... 7 Overview: The carrier-grade NAT (CGNAT) module... 7 About ALG Profiles...8 About CGNAT

More information

BIG-IP System: Initial Configuration. Version 12.0

BIG-IP System: Initial Configuration. Version 12.0 BIG-IP System: Initial Configuration Version 12.0 Table of Contents Table of Contents Legal Notices...5 Legal notices...5 Introduction to BIG-IP Initial Configuration...7 About BIG-IP initial configuration...7

More information

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle s BEA WebLogic Version 1.0 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s BEA WebLogic Prerequisites and

More information

Optimize DNS, Secure and Ensure Availability, and Monetize Usage

Optimize DNS, Secure and Ensure Availability, and Monetize Usage Service Provider BIG-IP DATASHEET Optimize, Secure and Ensure Availability, and Monetize Usage What s Inside 2 Increasing Services Demand 2 F5 Services in Service Provider Networks 9 Simple Management

More information

BIG-IP DataSafe Configuration. Version 13.1

BIG-IP DataSafe Configuration. Version 13.1 BIG-IP DataSafe Configuration Version 13.1 Table of Contents Table of Contents Adding BIG-IP DataSafe to the BIG-IP System...5 Overview: Adding BIG-IP DataSafe to the BIG-IP system... 5 Provisioning Fraud

More information

SYSTEMATIC SDN AND NFV WORKSHOP 2014 BUSINESS AND ECONOMIC ASPECTS OF SDN AND NFV

SYSTEMATIC SDN AND NFV WORKSHOP 2014 BUSINESS AND ECONOMIC ASPECTS OF SDN AND NFV SYSTEMATIC SDN AND NFV WORKSHOP 2014 BUSINESS AND ECONOMIC ASPECTS OF SDN AND NFV Bell Labs May 2014 1 BUSINESS AND ECONOMIC ASPECTS OF SDN AND NFV AGENDA 1. Introduction Challenging times for operators

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

Security Overview and Cisco ACE Replacement

Security Overview and Cisco ACE Replacement Security Overview and Cisco ACE Replacement March, 2014 Florian Hartmann, Senior Systems Engineer DACH A10 Corporate Introduction Headquarters in San Jose 800+ Employees Offices in 32 countries Customers

More information

F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager. Upcoming Dates. Course Description. Course Outline

F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager. Upcoming Dates. Course Description. Course Outline F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to

More information

Innovating to Increase Revenue

Innovating to Increase Revenue WHITE PAPER Innovating to Increase Revenue Uniquely Driving Differentiation & Competitive Advantage INTRODUCTION The business drivers for mobile operators looking to transform their networks are: 1) Declining

More information

Managing the Subscriber Experience

Managing the Subscriber Experience Managing the Subscriber Experience Steven Shalita TelcoVision 2013 October 24, 2013 Las Vegas 1 1 Service Delivery Orchestration More Important Than Ever Exponential Growth in Data & Video Traffic Personalized

More information

SaaS. Public Cloud. Co-located SaaS Containers. Cloud

SaaS. Public Cloud. Co-located SaaS Containers. Cloud SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers APP SERVICES ACCESS TLS/SSL DNS NETWORK WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES F5 Beside the Cloud Why Get Closer to

More information

GTP-based S2b Interface Support on the P-GW and SAEGW

GTP-based S2b Interface Support on the P-GW and SAEGW GTP-based S2b Interface Support on the P-GW and SAEGW This chapter describes the GTP-based S2b interface support feature on the standalone P-GW and the SAEGW. Feature, page 1 How the S2b Architecture Works,

More information

RESTCOMMONE. SIP Servlets. Copyright All Rights Reserved Page 2

RESTCOMMONE. SIP Servlets. Copyright All Rights Reserved Page 2 RESTCOMMONE SIP Servlets Copyright All Rights Reserved Page 2 RestcommONE Core Components RestcommOne Connect Visual Designer Web Browser WebRTC SDK s Mobile WebRTC SDK s RESTful API Layer RestcommOne

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Deploying Scalable Services on an MX Series Router Acting as a Broadband Network Gateway Release NCE0062 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Palo Alto Networks PCNSE7 Exam

Palo Alto Networks PCNSE7 Exam Volume: 96 Questions Question: 1 Which three function are found on the dataplane of a PA-5050? (Choose three) A. Protocol Decoder B. Dynamic routing C. Management D. Network Processing E. Signature Match

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

Building a Profitable Data Future. Monetizing Data Traffic

Building a Profitable Data Future. Monetizing Data Traffic Building a Profitable Data Future Monetizing Data Traffic Market Introduction Driven by an upsurge in smartphone usage, increased mobile-broadband penetration and enormous growth in video consumption,

More information

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe ICN & 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe Performance and Security Today User Equipment Access Network Core/Service Network Application Servers 2 NEC Corporation

More information

Cisco ASR 5000 Series Small Cell Gateway

Cisco ASR 5000 Series Small Cell Gateway Data Sheet Cisco ASR 5000 Series Small Cell Gateway Mobile subscribers want access to the network at home, work, hotspots, and everywhere in between. This requires mobile operators to expand their service

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

PORTA ONE. PortaSwitch. 55 Maintenance Release. Interoperability Guide. Documentation PortaOne, Inc. All rights reserved

PORTA ONE. PortaSwitch. 55 Maintenance Release. Interoperability Guide. Documentation PortaOne, Inc. All rights reserved PORTA ONE PortaSwitch Interoperability Guide 55 Maintenance Release Documentation 2000 2016 PortaOne, Inc. All rights reserved www.portaone.com Copyright Notice & Disclaimers Copyright 2000 2016 PortaOne,

More information

BIG-IP Access Policy Manager (APM) v11.2 Table of Contents

BIG-IP Access Policy Manager (APM) v11.2 Table of Contents BIG-IP Access Policy Manager (APM) v11.2 Preface: Product Overviews and Hardware... P-1 BIG-IP Product Family... P-1 F5 Hardware... P-4 F5 Services... P-9 F5 Resources and Tools... P-11 Module 1: BIG-IP

More information

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1 BIG-IP Access Policy Manager : Visual Policy Editor Version 12.1 Table of Contents Table of Contents Visual Policy Editor...7 About the visual policy editor...7 Visual policy editor conventions...7 About

More information

Application Awareness: The Critical Enabler in Virtualized Networks

Application Awareness: The Critical Enabler in Virtualized Networks Application Awareness: The Critical Enabler in Virtualized Networks Contents Introduction... 3 Application Awareness Plays a Central NFV/SDN Role... 4 Handling Encryption... 5 Application Metadata... 6

More information

Technology Brief. VeloCloud Dynamic. Multipath Optimization. Page 1 TECHNOLOGY BRIEF

Technology Brief. VeloCloud Dynamic. Multipath Optimization. Page 1 TECHNOLOGY BRIEF Technology Brief Page 1 This document discusses the key functionalities and benefits of (DMPO) that assures enterprise and cloud application performance over Internet and hybrid WAN. Contents Page 2 Introduction

More information

EVOLUTION OF SUBSCRIBER AND APPLICATION CONTROL : BRIDGING THE GAP BETWEEN NETWORK AND APPLICATIONS. Jacopo Pianigiani September 18 th, 2012

EVOLUTION OF SUBSCRIBER AND APPLICATION CONTROL : BRIDGING THE GAP BETWEEN NETWORK AND APPLICATIONS. Jacopo Pianigiani September 18 th, 2012 EVOLUTION OF SUBSCRIBER AND APPLICATION CONTROL : BRIDGING THE GAP BETWEEN NETWORK AND APPLICATIONS Jacopo Pianigiani September 18 th, 2012 AGENDA The evolution of control in Service providers services

More information

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform By the F5 business development team for the Microsoft Global Alliance Version 1.0 Introduction As the use of mobile devices in the

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

Subscriber-aware Dynamic SFC

Subscriber-aware Dynamic SFC Subscriber-aware Dynamic SFC Madhu Kashyap Dir. of Product Management Netsia Serkant Uluderya Engineering Mgr. Netsia 1 About Netsia Working with Leading Operators in Tandem Collaboration & Partnerships

More information

Implementation Guide - VPN Network with Static Routing

Implementation Guide - VPN Network with Static Routing Implementation Guide - VPN Network with Static Routing This guide contains advanced topics and concepts. Follow the links in each section for step-by-step instructions on how to configure the following

More information

BIG-IP Local Traffic Manager : Implementations. Version 12.1

BIG-IP Local Traffic Manager : Implementations. Version 12.1 BIG-IP Local Traffic Manager : Implementations Version 12.1 Table of Contents Table of Contents Configuring a Simple Intranet...13 Overview: A simple intranet configuration...13 Task summary...13 Creating

More information