F5 and the 8 Ways to Virtualization



Similar documents
Connecting to the Cloud with F5 BIG-IP Solutions and VMware VMotion

Optimizing VMware View VDI Deployments with F5

The VDC Maturity Model Moving Up the Virtual Data Center Stack

VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking

F5 White Paper. The F5 Powered Cloud

Deploying F5 Application Ready Solutions with VMware View 4.5

High-Performance DNS Services in BIG-IP Version 11

BIG-IP LTM VE The Virtual ADC Your Physical ADC Has Been Missing

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

F5 and Microsoft Delivering IT as a Service

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Deploying the BIG-IP System with VMware vcenter Site Recovery Manager

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

Deploying the BIG-IP System for Microsoft Application Virtualization

Integrating F5 Application Delivery Solutions with VMware View 4.5

Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure

ScaleN: Elastic Infrastructure

Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes

Achieve Unified Access Control and Scale Cost-Effectively

Building an Enterprise Cloud with F5 and IBM

Secure iphone Access to Corporate Web Applications

Optimize Application Delivery Across Your Globally Distributed Data Centers

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

F5 and Secure Windows Azure Access

Load Balancing 101: Firewall Sandwiches

Trends in Enterprise Virtualization Technologies. A Research Study by F5 Networks

Post-TMG: Securely Delivering Microsoft Applications

Revenue [in $ Millions] Gross Margin [in %] 125.4

Deploying the BIG-IP LTM with IBM WebSphere MQ

Deliver Secure and Accelerated Remote Access to Applications

Deploying the BIG-IP System v11 with LDAP Servers

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

Achieve Unified Access Control and Scale Cost-Effectively

The On-Demand Application Delivery Controller

Intelligent Layer 7 DoS and Brute Force Protection for Web Applications

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

Deploying the BIG-IP LTM with IBM QRadar Logging

Oracle Database Firewall

F5 Data Solutions w ofercie NASK

Operating Margin (in %) Gross Margin (in %) restated - - restated -

Deploying F5 with IBM Tivoli Maximo Asset Management

Deploying the BIG-IP System v11 with DNS Servers

Application Traffic Management

BIG-IP ASM plus ibypass Switch

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

Filling the Threat Management Gateway Void with F5

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Simplify Data Management and Reduce Storage Costs with File Virtualization

Deploying F5 to Replace Microsoft TMG or ISA Server

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Configuring the BIG-IP LTM v11 for Oracle Database and RAC

Document version: 1.3 What's inside: Products and versions tested Important:

Configuring the BIG-IP LTM for FAST Search Server 2010 for SharePoint 2010

Getting More Performance and Efficiency in the Application Delivery Network

F5 Data Manager Sample Report and Analysis

Link Controller ENSURES RELIABLE NETWORK CONNECTIVITY

Application Security in the Cloud with BIG-IP ASM

Deliver More Applications for More Users

Accelerating Mobile Access

F5 and VMware. Realize the Virtual Possibilities.

Getting Started with BIG-IP

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy

Competitive Replacement Program: Product Matrix

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

The Shortfall of Network Load Balancing

Deploying the BIG-IP System v11 with SAP NetWeaver and Enterprise SOA: ECC

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5

Security F5 SECURITY SOLUTION GUIDE

ARX Add-on: ARX1500+ License Upgrade (Limited to Enterprise) ARX Add-on: ARX1500+ Second Protocol License

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

F5 Datacenter Virtualization & Application Security

Operationalizing the Network: SDN

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Virtualization, SDN and NFV

Load Balancing for Microsoft Office Communication Server 2007 Release 2

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

Cisco-Citrix Alliance

The F5 Intelligent DNS Scale Reference Architecture.

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Transcription:

F5 White Paper F5 pioneered the concept of breaking up data center virtualization technologies into eight unique categories within the data center. Any virtualization products or technologies implemented in the data center will fall into one of these eight categories. With this paper, F5 discusses how it has implemented these same technologies within its own product line, helping enterprises get closer to achieving their goal of a implementing a complete Virtual Data Center with F5 s Application Delivery Networking products. By Alan Murphy Technical Marketing Manager

Contents Operating System Virtualization 3 Application Server Virtualization 4 Application Virtualization 4 Management Virtualization 5 Network Virtualization 5 Hardware Virtualization 6 Storage Virtualization 6 Service Virtualization 7 Conclusion 7 2

There s no question that virtualization became the IT buzzword of 2007, and all indications are that this trend will continue with more gusto in 2008. Having already procured a dedicated article in almost all IT trade magazines as well as spawning entire conferences, there is still debate in the industry about what the term virtualization really means and its scope in the enterprise. The most common definitions still focus on operating system (OS) and desktop virtualization; the virtualization of the data center is still relatively unchartered territory. Earlier this year, F5 addressed the lack of focus on the virtual data center by releasing a white paper titled Virtualization Defined: 8 Ways, where the technical components that make up all parts of the virtual data center were broken down into eight unique categories. This paper was more than just a market definitions paper: it was the blueprint for how F5 implements these different virtualization concepts and then uses these ideas to manage the virtual data center. F5 Enterprise Manager and the forthcoming ControlPoint products provide product proof points for F5 s dedication and commitment to total virtual data center management, extending the concepts of the Application Ready Network (ARN) into data center management through tools like dynamic provisioning of applications. Beyond these two management products, however, F5 has implemented various virtualization concepts since the introduction of the TMOS architecture in 2004. Operating System Virtualization Since F5 appliances are built on custom hardware, there is no need to run any of our network applications on a general-purpose hypervisor (the defining characteristic of operating system virtualization). F5 s BIG-IP architecture enables software components to run as modules and interact with the TMM (Traffic Management Microkernel) directly, providing a closed system for hardware and software optimization. Through F5 icontrol, an open management API, F5 products can communicate directly with, and even manage, virtual operating system infrastructure platforms such as Microsoft s Hyper-V and VMware s ESX products. This native management integration enables BIG-IP Local Traffic Manager (LTM), for example, to send instructions directly to ESX instructing it to turn up and provision new operating system images when system images reach a predetermined performance threshold. 3

Application Server Virtualization Using the many:1 (many-to-one) virtualization tenant (where many resources are virtualized in a manner to appear as one single service instance), the basic principle of application server virtualization turns many servers on the back-end into one server on the front-end. This has typically been referred to as a load balancer or a reverse proxy. TMOS defined the industry standard for application server virtualization, moving the market away from simple load balancing and into the more sophisticated world of true Application Delivery Networking (ADN). Simply stated, everything F5 builds is created to address application server virtualization. While application server virtualization is most frequently associated with BIG-IP Local Traffic Manager, F5 s LAN-based Application Delivery Controller (ADC), the same technology also applies to BIG-IP Global Traffic Manager, F5 s WAN ADC, which makes multiple data centers appear as one over the WAN, as well as the secure reverse proxy available in FirePass SSL VPN. From local ADN functions on the LAN in the data center through global ADN with availability and delivery over the WAN, F5 core competency is application server virtualization. Application Virtualization Application virtualization is all about delivering the full application to the user over any network in any scenario, under any circumstance, and via any environment. Unlike web and serverbased applications, application virtualization typically refers to delivering complete self-contained local applications to the user. These are also referred to as complete virtual environments. There are some components to application virtualization with BIG-IP LTM (primarily concerned with parsing the binary data stream that carries these virtual applications over the wire and providing application delivery availability), but the majority of F5 s support for application virtualization comes through FirePass and BIG-IP Secure Access Manager (SAM). FirePass and BIG-IP SAM have dedicated application virtualization functions such as the built-in reverse proxy, terminal services virtualization, and support for Citrix s Metaframe and Presentation Server. 4

Management Virtualization The most direct example of F5 s implementation of management virtualization is BIG-IP product auth domains. Auth domains create isolated and secure partitions for each management function necessary to manage an Application Delivery Controller. For example, there may be two administrative partitions on BIG-IP LTM: the network partition for managing the network infrastructure such as IP addresses, VLANs, and routing and the application security partition for managing the security policy associated with applications behind BIG-IP LTM. When administrators are assigned to a partition, they are isolated within that partition so they can only change options within the partition realm. Another example is the service provider model, where a partition can be created that can manage all attributes associated with a particular application from layer 2 through layer 7 such as VIPs, nodes, health monitors, routing, etc. Managing a complete F5-based Application Delivery Network with Enterprise Manager, F5 s device management platform, is another example of management virtualization, allowing administrators to manage multiple devices as one single device. Network Virtualization Network virtualization is another virtualization category that F5 has implemented since the release of TMOS in 2004. VLAN and SNAT support are the two most fundamental examples of network virtualization. While typical data center architecture dictates that all network virtualization tasks happen at the edge of the data center, F5 appliances support multiple levels of network virtualization behind the network switching infrastructure, which is propagated all the way through application-routing decisions. The ability to carry this information through the application session lifecycle enables TMOS to execute context-based decision making during application delivery based on virtual network information and policies. Policies can be built and shared across multiple public and private virtual networks. Additional examples of TMOS-supported network virtualization include basic Virtual IPs (VIPs), link aggregation (typically referred to as trunking), and rate shaping. 5

Hardware Virtualization Possibly the most critical virtualization category that F5 has implemented to date, and definitely the largest commitment, is hardware virtualization. With the release of VIPRION, F5 put a stake in the sand of the virtual data center and is proudly waving the hardware virtualization choice to go with dynamic virtualization. There are two basic types of hardware virtualization: slicing, where one resource is carved up and pre-allocated to look like many resources, and dynamic, where that same one resource is carved up into multiple resources as needed, the opposite approach to hardware slicing. As more blades and resources are added to the VIPRION chassis, resources for application traffic management are consumed as need across all blades. Although most solutions today opt for slicing; in an enterprise data center, slicing arbitrarily limits what each sliced, pre-allocated resource can do and how they can grow. Dynamic provisioning and real-time capacity allocation and provisioning is a crucial component of the virtual data center, as pre-sliced hardware allocation is unable to achieve this requirement. Dynamic allocation of virtual hardware resources is the only path to true dynamic provisioning in the virtual data center, allowing the data center and application delivery resources to grow as needed, as capacity and resource dictates. Storage Virtualization Within the virtual data center, both types of storage virtualization (block and file) are important components. For F5 s part in the virtual Application Delivery Network, file virtualization is managed by the F5 Acopia ARX appliances and its FreedomFabric network operating system, which creates a global namespace of file locations (supporting both Windows and Unix file servers) anywhere on the ADN wire, providing access to files regardless of their location or physical proximity to any single data center. F5 Acopia ARX also supports real-time data migration, storage tiering (dynamic allocation of critical files to critical storage infrastructure), and file-based load balancing. Within the data center Application Delivery Network, ARX dynamically allocates file resources based on need, usage patterns, and access restrictions of the applications on the network, all enforced and governed by management virtualization policies. 6

Service Virtualization It is safe to state that F5 s entire business is built upon and designed around the idea of providing any application to any user under any circumstance. This idea is the core principle of service virtualization and ultimately the reason for creating the virtual data center. F5 s Application Ready Network (ARN) is an excellent example of service virtualization in action: the ARN is an architecture implementation designed to deliver applications on demand. If a user is accessing a SharePoint service over a satellite link in the woods, or a dial-up link from an airport public phone, or on the move via their mobile phone, or even over their home broadband connection, the goal is simply access and availability to the application data. The ARN architecture components are responsible for piecing together the various connection limitation and access scenarios on the fly and providing seamless access to the application services; this is also the core concept of the virtual data centerservice virtualization, in a nutshell, is the unified orchestration of the virtual data center. Conclusion While many companies are content to languish in their siloed corners of the data center, F5 is blazing a new trail by bringing all parts of the data center together to achieve one common goal: deliver the best possible application availability, performance, and security to users. As enterprises begin to move forward and build fully virtualized data centers, F5 will be leading the way, with both vision and product, with them to achieve their goals. Whether they are looking to save space in one data center or add a global virtualization overlay between all data centers, F5 has built technology to support this migration in the only way that customers can be successful. F5 Networks, Inc. Corporate Headquarters 401 Elliott Avenue West Seattle, WA 98119 +1-206-272-5555 Voice (888) 88BIGIP Toll-free +1-206-272-5556 Fax www.f5.com info@f5.com F5 Networks Asia-Pacific +65-6533-6103 Voice +65-6533-6106 Fax info.asia@f5.com F5 Networks Ltd. Europe/Middle-East/Africa +44 (0) 1932 582 000 Voice +44 (0) 1932 582 001 Fax emeainfo@f5.com F5 Networks Japan K.K. +81-3-5114-3200 Voice +81-3-5114-3201 Fax info@f5networks.co.jp WP-F5-and-8-ways-to-virtualization 02/08 2008 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, VIPRION, FirePass, and icontrol are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. 7