F5 and Secure Windows Azure Access



Similar documents
Filling the Threat Management Gateway Void with F5

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud

Deploying the BIG-IP LTM with IBM QRadar Logging

F5 and VMware. Realize the Virtual Possibilities.

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Deploying the BIG-IP LTM with IBM WebSphere MQ

Deploying the BIG-IP System for Microsoft Application Virtualization

Cloud: Bridges, Brokers and Gateways

Oracle Database Firewall

Deploying the BIG-IP System v11 with DNS Servers

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

Prompta volumus denique eam ei, mel autem

Safely Extend the Enterprise to Personal Mobile Devices

ScaleN: Elastic Infrastructure

The F5 Intelligent DNS Scale Reference Architecture.

Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure

Deliver More Applications for More Users

The Shortfall of Network Load Balancing

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

Integrating F5 Application Delivery Solutions with VMware View 4.5

Post-TMG: Securely Delivering Microsoft Applications

The On-Demand Application Delivery Controller

Connecting to the Cloud with F5 BIG-IP Solutions and VMware VMotion

Document version: 1.3 What's inside: Products and versions tested Important:

F5 White Paper. The F5 Powered Cloud

Deploying the BIG-IP System v11 with LDAP Servers

Accelerating Mobile Access

Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

Prompta volumus denique eam ei, mel autem

Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance

Optimize Application Delivery Across Your Globally Distributed Data Centers

Building an Enterprise Cloud with F5 and IBM

High-Performance DNS Services in BIG-IP Version 11

Configuring the BIG-IP LTM for FAST Search Server 2010 for SharePoint 2010

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy

Adaptable and Resilient VDI Deployments

Deploying F5 to Replace Microsoft TMG or ISA Server

F5 and Microsoft Delivering IT as a Service

Deploying F5 Application Ready Solutions with VMware View 4.5

Configuring the BIG-IP LTM v11 for Oracle Database and RAC

Optimizing VMware View VDI Deployments with F5

F5 Data Manager Sample Report and Analysis

Cloud Balancing: The Evolution of Global Server Load Balancing

Operationalizing the Network: SDN

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Deploying the BIG-IP System with VMware vcenter Site Recovery Manager

Simplify Data Management and Reduce Storage Costs with File Virtualization

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

Protect Your Business and Customers from Online Fraud

Driving Data Migration with Intelligent Data Management

Load Balancing 101: Firewall Sandwiches

Cloud Balancing - A Case Study in Global Application Development

Software Defined Application Services

Competitive Replacement Program: Product Matrix

Secure iphone Access to Corporate Web Applications

Enabling Flexibility with Intelligent File Virtualization

Create a Smarter Storage Strategy

BIG-IP LTM VE The Virtual ADC Your Physical ADC Has Been Missing

Protecting Against Online Fraud with F5

Deploying F5 with IBM Tivoli Maximo Asset Management

Achieve Unified Access Control and Scale Cost-Effectively

Fight Malware, Malfeasance, and Malingering with F5

Clustering and Queue Replication:

Deliver Secure and Accelerated Remote Access to Applications

Deploying the BIG-IP System v11 with SAP NetWeaver and Enterprise SOA: ECC

Link Controller ENSURES RELIABLE NETWORK CONNECTIVITY

Competitive Replacement Program: Product Matrix

The VDC Maturity Model Moving Up the Virtual Data Center Stack

BIG-IP ASM plus ibypass Switch

F5 and the 8 Ways to Virtualization

Achieve Unified Access Control and Scale Cost-Effectively

Deployment Guide. Deploying F5 BIG-IP Global Traffic Manager on VMware vcloud Hybrid Service

VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

F5 and Microsoft Exchange Security Solutions

Challenges of Private Cloud Implementations

BEST PRACTICES. Application Availability Between Hybrid Data Centers

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

Optimize Application Delivery Across Your Globally Distributed Data Centers

Accelerate Web Applications, Improve User Experience, and Increase Revenue

ORACLE S SIEBEL BUSINESS APPLICATIONS 8.0

Application Security in the Cloud with BIG-IP ASM

Microsoft SharePoint 2010 APPLICATION READY SOLUTION GUIDE

Reasons Enterprises. Prefer Juniper Wireless

Optimize Application Delivery Across Your Globally Distributed Data Centers

Reaping the Full Benefits of a Hybrid Network

Intelligent Layer 7 DoS and Brute Force Protection for Web Applications

APPLICATION READY NETWORK GUIDE PEOPLESOFT ENTERPRISE APPLICATIONS

Security F5 SECURITY SOLUTION GUIDE

Deploying the BIG-IP System v11 with RADIUS Servers

Application Traffic Management

ARISTA NETWORKS AND F5 SOLUTION INTEGRATION

Vblock Systems hybrid-cloud with Cisco Intercloud Fabric

Getting Started with BIG-IP

Transcription:

PARTNER USE CASE F5 and Secure Windows Azure Access F5 technologies give enterprises a new way to provide secure remote access and traffic management within their infrastructure. Ryan Korock, F5 Networks

Contents Introduction 3 Expanding into 4 Managing Multi-Cloud Environments 5 Performance, Security, and Redundancy 6 Conclusion 8 2

Introduction For nearly two decades, enterprises have relied on F5 in the data center to provide intelligence and sophistication in the network to complement commonly deployed advanced server applications. With the modern F5 TMOS traffic management engine, an operating system built from the ground up for application delivery on the F5 BIG-IP platform, data centers have achieved unparalleled levels of scalability, performance, and security by taking advantage of an often overlooked resource: the network. As enterprises look to expand to the public cloud, they must ensure that the same level of network intelligence and control they achieve with F5 in the local data center can be extended into the cloud. Customers Users Data Center - Local Area Network Figure 1: Traditional data center configuration using the BIG-IP platform for advanced traffic management. These same enterprises have recently begun to blur the traditional boundaries of the data center by extending local workloads into the public cloud. With Azure, you can take advantage of the resiliency and scale efficiencies that can only be offered by a public cloud, and F5 expands on these capabilities by enabling you to secure and manage the traffic between on-premises data centers and the cloud via the network. 3

Expanding into Most enterprises looking to host workloads in are discovering that a hybrid approach allows them to reap the benefits of the public cloud, while also keeping sensitive data within the confines of the corporate data center. The hybrid model, with workloads hosted both locally and within the Azure cloud, provides the foundation for you to manage costs, achieve the desired resiliency, and comply with data regulations. You can extend these benefits by leveraging the native traffic management and security features of the F5 BIG-IP platform. Data Center 1 Customers LTM + BIG-IP Local Traffic Manager Users Corporate Data Center Figure 2: You can establish a secure IPsec tunnel between your corporate data center and Windows Azure using the BIG-IP platform. 4

Azure Secure Tunneling Hybrid deployments are most successful when the Azure cloud is deployed as an extension of the corporate data center, rather than as a separate data center. But to achieve this, you need secure and seamless connectivity between the two data centers. F5 BIG-IP Local Traffic Manager (LTM), which has an advanced IPsec engine built into its core traffic management engine, can bridge the corporate and Azure networks by creating a secure tunnel and routing between them as if they were connected by the same local fabric. Traffic Management in the Azure Cloud With resources active in your local data center and in the cloud, and costs accruing differently for each, you can use Azure most cost-effectively by managing network traffic appropriately. Sometimes it may make sense to keep all traffic in the corporate data center until bursting is necessary; or maybe you need to load balance traffic concurrently amongst the server farm split across the Azure cloud and local data centers. BIG-IP LTM seamlessly manages this traffic between Azure and the local data center minimizing costs and maximizing availability and performance. Managing Multi-Cloud Environments With multiple geographically dispersed Azure data centers over which to spread the network workload, you could leverage Azure for site resiliency. To realize this potential, you can use the intelligence and network management engine in BIG-IP LTM. Not only is a single instance of BIG-IP LTM capable of supporting IPsec tunnels to multiple Azure clouds, but more important, it can intelligently manage the traffic to each virtual network, whether local or remote. BIG-IP LTM can split traffic to multiple Azure clouds based on end-to-end performance of each specific user, and based on availability, cost, or specific workload. And with the F5 irules scripting language, you can split, isolate, or load balance traffic based on almost any criteria. 5

Data Center 1 Data Center 2 Customers LTM + BIG-IP Local Traffic Manager Users Corporate Data Center Figure 3: A single instance of BIG-IP LTM can manage secure tunnels to multiple Azure endpoints. Performance, Security, and Redundancy For enterprises that want to take full advantage of their cloud investment, creating the tunnel from the data center to the Azure cloud(s) is just part of the solution; even more critical is making sure that the tunnels are optimized, secure, and fault tolerant. When enterprises configure BIG-IP LTM as the gateway to the Azure cloud, it will negotiate an IPsec connection using industry-leading encryption at near wire speed. BIG-IP LTM s network awareness means it can determine when to enable WAN acceleration features as it sends users to remote Azure clouds. And with most F5 gear deployed as 6

redundant pairs, the BIG-IP devices can be configured as tunnel backups for each other. As soon as a failover occurs, the newly activated device will establish a new IPsec tunnel with Azure, minimizing any disruption of service. Data Center 1 Data Center 2 Customers LTM LTM Active-Passive Pair of BIG-IP Devices Running BIG-IP Local Traffic Manager Users Corporate Data Center Figure 4: An active-passive pair of BIG-IP devices eliminates the possibility of service disruption. 7

Conclusion With a rich hosting toolset available for enterprises to take advantage of, Azure has quickly evolved into a system that enterprises can rely on to manage their businesscritical workloads. By having F5 manage the network between the local data center and the Azure clouds, the benefits of Azure increase rapidly and dramatically. With the ability to define traffic preferences, awareness of the health and availability of both the local and remote workloads, and FIPS-level strength encryption standards, you can count on the F5 solution to direct users to the local or remote resources with performance, cost, and security in mind. Learn More To find technical details and deployment configuration guidance, visit DevCentral, F5 s user community of 120,000+ members; you can also visit f5.com/microsoft. You can also contact msfttechteam@f5.com anytime for more information. F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com F5 Networks, Inc. Corporate Headquarters info@f5.com F5 Networks Asia-Pacific apacinfo@f5.com F5 Networks Ltd. Europe/Middle-East/Africa emeainfo@f5.com F5 Networks Japan K.K. f5j-info@f5.com 2013 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. PUC-5356 0613