PacketShaper

Transcription

PacketShaper
IBM Forum
16. Septembar 2010., Sarajevo
Aplication Delivery Network (ADN)
Mreža za isporku aplikacija
Saša Mandžukić
Emerging Markets Consultants
Emerging Markets Consultants
Firma EMC – Emerging Markets Consultants (konsultanti tržišta u razvoju), je
osnovana krajem 2007. sa sjedištem u Sarajevu.
Misija
Informatička podrška malim, srednjim i velikim preduzećima, te drugim
poslovnim subjektima u zemlji i inostranstvu.
Cilj
Našim klijentima pružiti rješenja “najbolje vrste”, koja će zadovoljiti njihove
potrebe i ponudimo naprednu podršku za njihove poslovne procese.
Vizija
Biti prepoznatljivi na tržištu kao pouzdana kompanija, na koju se klijenti oslanjaju
jer realno zadovoljavamo njihove potrebe i očekivanja.
Slide 2
Usluge koje nudimo:
•
savjetovanje (konsalting)
•
vođenje i koordinacija projekata
•
projektovanje računarskih, telekomunikacionih i sigurnosnih
sistema
•
razvoj i prilagodba poslovnih aplikacija
•
implementacija
•
tehnička podrška i održavanje
•
edukacija
T, U
S
O OL
V
I
L J NT R
D
I
V KO IJA
E
IT ST I AC
D
E O NIK
V
U RN MU
GU KO
I
S
Slide 3
Rješenja:
Mrežna i sigurnosna rješenja
Routing & Switching, VPN rješenja, IP Telephony & Unified
Communication,Bežična tehnologija, Antivirusna zaštita, Enkripcija.
Wan Optimizacija, Secure web gateway, IPS.
Sistemska rješenja
Active Directory, File Server, Print Server, Fax Server, Web application
server (IIS, ASP.NET), Terminal server, Remote access/VPN server, DNS
Server, DHCP server, Storage sistemi, Backup i arhiva podataka.
Aplikativna rješenja
ERP Microsoft Dynamics Navision, CRM, Aplikacije po narudžbi.
SaaS-Hostrani web i mail security.
Slide 4
Satelitski pristup internetu:
U suradnji sa evropskim i lokalnim Internet provajderima, u mogućnosti
smo ponuditi implementaciju sistema satelitske komunikacije i pristup
Internetu.
Satelitski internet je ponajprije namijenjen firmama s poslovnicama na
lokacijama koje su izvan pokrivenosti aDSL-om, kablovskog interneta ili
wireless rješenja, a imaju potrebe za brzim internetom, ili kao rezervni
link za kritične poslovne aplikacije.
Slide 5
Reference
•
BH Telecom d.d.
•
Raiffeisen Bank d.d.
•
Fabrika Duhana Sarajevo
•
NATO Peace Support Operations Training Center
•
Raiffeisen Leasing d.o.o.
•
Petrol BH Oil Company d.o.o.
•
Agencija za poštanski promet
•
Regulatorna agencija za komunikacije
•
Institut za intelektualno vlasništvo
•
Vlada Federacije Bosne i Hercegovine
•
Fondacija za inovativne tehnologije BIT Centar
•
... i drugi
Slide 6
Rješanja za
vidljivost komunikacija i akceleraciju
Security
Acceleration
Visibility
Slide 7
IBM Forum
16. Septembar 2010., Sarajevo
Aplication Delivery Network (ADN)
Mreža za isporku aplikacija
Saša Mandžukić
Emerging Markets Consultants
ADN Solution Suite
PacketShaper
Application Visibility & QOS
Secure Web Gateway
WAN Optimization
Network Assessment
Malware Prevention
File & Email Acceleration
Network & Application
Performance Monitoring
SSL Visibility and Control
Data/Server Consolidation
Web Content Filtering
Web & SSL Acceleration
Voice & Video Conference
Quality Delivery
Remote Web Control
Rich Media Delivery / CDN
Bandwidth Management
IM & P2P Control
Replication & Backup
P2P Traffic Shaping
Digital Leakage Protection
Live Video Stream Splitting
MPLS Migration
9
ProxySG
Slide 9
Sve na Webu - Sigurnost
Web Browser je postao univerzalan način pristupa
Neprikladno
korištenje
Surfanje po Webu
Instant Messaging
P2P file sharing
Ali donosi
rizike za
poslovanje!!
Zloupotreba
mreže
Backdoor,
Virusi
Web email
Instant Messaging
P2P file sharing
P2P file sharing
Audio/Video Streaming
Spyware
Rješenje je u kontroli, ne samo blokiranju
Slide 10
Virtualisation and Centralisation - Wan Optimizacija
• Virtualisation
• Centralisation
– Eliminate storage arrays in
Remote Offices
– Business-driven
– Business-driven
• Compliance
• Cost
• Cost
• Security
• High availability
• Control
• Power consumption
• Hardware utilisation
Data Center
Storage Centralisation
Remote
Office
11
– Completely abstracting
logical storage from
physical storage
Slide 11
Vidljivost - QOS
End User
Network/NO
C
Helpdesk
• Valid?
• Is SAP slow?
• Which part of SAP?
• Network problem?
• What is causing issue?
• Who is causing it?
• How do I fix it?
Complaint
“Network is slow,
SAP is slow”
Slide 12
Resolution?
Secure Web Gateway Requirements
• Organizations struggle to battle malware threat
• Corporate compliance for acceptable Internet
use
• Visibility into web and network trends
• Need to mitigate data leakage of sensitive info
• Unproductive content overwhelms the
network
• IT needs to protect all users, all locations
13
Slide 13
Blue Coat WebPulse:
Implementing Dynamic Link Analysis
Multiple Threat Engines
Machine Analysis
Human Raters
+1B Requests
Per Week
WebFilter
54 Million Users
ProxySG & ProxyClient
Enterprise Users
K9 Consumer Users
Immediately Protects Blue Coat Web Gateway
and Remote Users
14
Slide 14
SWG Request Controls - All
• All Requests:
– Default & Custom Logging & Reporting
– Object Caching upwards of 50% (optional for SSL)
• Object Pipelining & Adaptive Refresh patented technologies
– Bandwidth Management (e.g. Streaming media)
– Protocol Optimization
Object
Cache
Bandwidth
Management
Protocol
Optimization
Log Files
Reporter
Malware
Detection
Protocol
Content
Compliance Filters
Data
Types
Active
Content
Internet
URL
Filtering
DLP
Checks
AAA
Policy
Method Controls
Cert. Validation
ProxySG
15
Slide 15
Blue Coat Layered Defenses
Cloud Service
WebPulse & WebFilter
Inline Threat Detection
ProxyAV
Web Application & Content Controls
ProxySG
Integrated Data Loss Prevention
ProxySG with 6 DLP partners
Remote Users
ProxyClient
16
Slide 16
Firewall Æ Ne pušta loše momke unutra
Web
poslužitelji na
intranetu
Vatrozid
Javni
Web
poslužitelji
Javni
Internet
Interna mreža
Korisnici
Vatrozid štiti
u pristupu . . .
Ali nije dizajniran za
kontrolu na razini korisnika
Slide 17
Hakeri
Proxy Æ Neka dobri momci ostanu dobri
Potpuna vidljivost i kontrola svih komunikacija preko Weba
Web
poslužitelji na
intranetu
Javni
Web
poslužitelji
Proxy
Vatrozid
Javni
Internet
Interna mreža
Users
Korisnici
Ograničenje ili kontrola
pristupa
neproduktivnim
Webovima
Početna stranica s
pravilima upotrebe
Interneta
Zaustavljanje sadržaja
na Webu kao što su
.vbs, .exe
Kontrola pop-up-a,
reklama i spyware-a
Sprečavanje
Logiranje
i arhiva
skidanja
IM
Ograničenje
Zaustavljanje
Sprečavanje
Početna stranica
ilivirusa
curenja
kontrola
ssa
Zaustavljanje
sadržaja
Kontrola pop-upa,
MP3
prometa
datoteka
na
razini
pod
pristupa
pravilima
webmaila
intelektualnog
neproduktivnim
upotrebe
(Yahoo,
na
Webu
kao
što
su
reklama i spyware-a
pojedinih
copyrightom
poruka
vlasništva
Hotmail,
Webovima
Interneta
etc)
preko
i IM
IM
.vbs,
.exe
Zaustavljanje virusa
sa webmaila (Yahoo,
Hotmail, etc) i IM
Sprečavanje curenja
intelektualnog
vlasništva preko IM
Slide 18
Sprečavanje skidanja
MP3 datoteka pod
copyrightom
Logiranje i arhiva IM
prometa na razini
pojedinih poruka
Blue Coat SG
Vidljivost. Kontrola. Performanse.
Napredno upravljanje pravilima
Tehnološki
partneri
ISS
Blue Coat AV
Usluge
On-Proxy
URL filtriranje
Web
Anti-Virus
AntiSpyware
IM, Streaming Reverse
& P2P kontrola
Proxy
Pravila
Engine za procesiranje pravila
Proxy
Autentikacija, autorizacija, logiranje
Vlastiti OS
SGOS™ Æ Objektno-bazirani OS + caching
Slide 19
Pod kontrolom s Blue Coatom
• Da “dobri” radnici ne rade “loše” stvari na Internetu
– Sve na Webu dovodi do povećanih rizika
• Blue Coat je #1 proizvođač proxy uređaja (IDC)
– Vlastiti, objektno bazirani OS i cache omogućuje wirespeed propusnost
– Upozoravanje, učenje i ograničavanje pomoću fleksibilnih
prava pristupa, do razine pojedinog korisnika
– Isporučeno preko 20000 proxy uređaja širom svijeta
• Znate li što vaši djelatnici rade na Internetu?
– Saznajte, pomoću “Ocjene Web prometa”
– I naučite kako zaustaviti spyware
Slide 20
A Day in the Life of “Bob Kent”
Bob.Kent
zzzzzzz
Edge_Corp4
Slide 22
Launch Internet Explorer Browser
Finds and displays information and Web sites on the Internet
Slide 23
10:45
Edge Corp new AUP - Microsoft Internet Explorer
Internet usage – Edge Corp Acceptable User Agreement.
You are logged in as: Bob Kent
Please respect our Acceptable Use Policy.
Edge Corp. reserves the right to log, monitor and manage all of your Internet usage
including the contents of encrypted sessions.
Click here to accept the policies
Click here to decline and close your browser
Edge Corp new AUP
Slide 24
Yahoo! – Microsoft Internet Explorer
http://www.katysfriends.com
Yahoo!
Slide 25
10:59
Adult content warning – Microsoft Internet Explorer
http://www.amazon.com
Hello again, Bob Kent
This is a message from the IT department. The website you are trying to access:
www.katysfriends.com
Is listed as a site within the category ADULT CONTENT and you are not allowed to visit this site.
Our Internet Acceptable Use Policy is available here: http://intranet.edgecorp.com/aup.htmp
For more help, email IT Support Desk or call extension 2875
Adult content warning
Slide 26
Amazon – Microsoft Internet Explorer
http://www.cnn.com\si.html
Hello again
Bob Kent
This is a message from the IT department. The
company policy is to allow users access to shopping
sites, however all access is logged and sent to
management every week.
This window will disappear in 10 seconds.
Amazon
Slide 27
CNN – Microsoft Internet Explorer
Hello again
Bob Kent
This is a message from the IT department. Your role
allows you to access Sports sites before 9:00 AM, from
12:00-1:00 PM, and after 4:00 PM. Please continue.
This window will disappear in 10 seconds.
CNN
Slide 28
Comet Cursor – 10,000 free cursors - Microsoft Internet Explorer
http://www.cisco.com/jobs
Bob Kent,
This is the IT Department.
You are attempting to download SPYWARE.
Edge Corp blocks known and unknown
spyware downloads at the gateway without
blocking safe content, so you can continue
browsing this site.
Comet Cursor
Slide 29
Hello from Human Resources - Microsoft Internet Explorer
https://gmail.google.com
Hello again, Bob Kent
As valued member of staff, we want to make sure you are happy here at Edge Corp.
If you would like an interview with HR to discuss your role, please email me.
Best Regards,
Lucy Smith
Human Resources
Slide 30
Gmail – Secure email from Google - Microsoft Internet Explorer
https://gmail.goole.com/inbox/28677$5552739/show.do
Gmail – Secure email …
Slide 31
Gmail – Secure email from Google - Microsoft Internet Explorer
https://gmail.goole.com/inbox/28677$5552739/attch-dload.do
Bob Kent,
This is the IT department.
We decrypted this attachment,
found a virus in it, and have
successfully deleted it.
Gmail – Secure email …
Slide 32
Spyware infection - Microsoft Internet Explorer
Hello, Bob Kent
This is a message from the IT department.
Your PC has just tried to send information to a known spyware site:
www.gator.com
We have blocked the spyware from sending your personal information out of the organization (using our
Proxy appliance), however your PC will run more slowly until the spyware is removed.
We are about to redirect you to the spyware removal software to remove this and any other spyware
from your PC, please click HERE to start.
For more help, email IT Support Desk or call extension 2875
Spyware infection
Slide 33
Slide 34
Paypa1 - Login - Microsoft Internet Explorer
https://www.paypa1.com/PayPal%20-%20Welcome.htm
[email protected]
*******
Bob Kent,
You have tried to POST information
to www.paypa1.com, we think this
could be a phishing site.
Call x3214 immediately for help
Paypa1 - Login
Slide 35
Windows Media Player
Plays your digital media including music, videos, CDs, DVDs and Internet Radio
Slide 36
1:45
Hello again
Bob Kent
Streaming media can adversely effect
network performance and employee productivity.
You cannot access Internet radio sites, or streaming media from
entertainment and sports sites.
Streaming from approved business sites is limited to 128Kbps.
You can access streaming media from internal sites with no
restrictions.
Slide 37
1:46
*******
Slide 38
10:45
Slide 39
BobK: Hey Martin, how are you?
MartinS: Great, what about you?
BobK: Not too bad
MartinS: have you heard about your results yet?
Slide 40
BobK: Hey Martin, I heard of a new development
MartinS: Oh yes, what?
BobK: Well, its project name is Goldengate and…
Slide 41
A Day in the Life of “Bob Kent”
Behind The Scenes
Launch Internet Explorer Browser
Finds and displays information and Web sites on the Internet
Slide 43
10:45
Yahoo! – Microsoft Internet Explorer
http://www.playboy.com
Slide 44
10:59
Adult Content Policy – Microsoft Internet Explorer
Hello again, Bob Kent
This is a message from the IT department. The website you are trying to access:
www.playboy.com
Is listed as a site within the category PORNOGRAPHY and you are not allowed to visit this site.
Our Internet Acceptable Use Policy is available here: http://intranet.edgecorp.com/aup.htmp
For more help, email IT Support Desk or call extension 2875
Slide 45
10:59
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Authenticated usernames:
Jednostavan pregled korisničkih web aktivnosti
Slide 46
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Bob Kent
Slide 47
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
www.playboy.com
Slide 48
Microsoft Corporation – Microsoft Internet Explorer
http://www.hotmail.com
Slide 49
2:05
10:46
MSN Hotmail – Inbox – Microsoft Internet Explorer
http://www.hotmail.com
[email protected]
[email protected]
Funny email from Jack R.
May 5
29KB
You’[email protected]
Win A Trip for Two To Hawaii
May 5
768KB
Hotmail Staff
Increase your email capacity
May 5
1KB
[email protected]
Here’s Your File!
May 5
29KB
Sam Johnson
Did you see the game last night?
May 4
7KB
Cassandra Love
Call Me.
May 4
540KB
[email protected]
Dinner with Peg and Alan on 4th?
May 4
29KB
Mary Smith
Did you call mom and dad about photos?
May 4
19KB
Kyle Lissabet
Win a free computer.
May 3
760KB
Slide 50
2:06
MSN Hotmail – Inbox – Microsoft Internet Explorer
http://www.hotmail.com
[email protected]
You’[email protected]
May 5, 2005 2:35 pm
[email protected]
[email protected]
Win A Trip for Two To Hawaii
You’[email protected]
Free_trip.pif
Funny email from Jack R.
Win A Trip for Two To Hawaii
Mar 31
29KB
Mar 31
768KB
Hotmail Staff
Increase your email capacity
Mar 30
1KB
[email protected]
Here’s Your File!
Mar 30
29KB
Sam Johnson
Mar 30
7KB
[email protected],
Call Me.
Mar 30
540KB
[email protected]
You’ve won a free trip to Hawaii.
Dinner with Peg and Alan on 4th?
Mar 30
29KB
Mary Smith
Did you call mom and dad about photos?
Mar 29
19KB
Kyle Lissabet
Win a free computer.
Mar 29
760KB
Cassandra Love
Did you see the game last night?
Download the Attached claim form to register and win your trip !
Slide 51
2:06
MSN Hotmail – Inbox – Microsoft Internet Explorer
http://www.hotmail.com
[email protected]
You’[email protected]
May 5, 2005 2:35 pm
[email protected]
[email protected]
Win A Trip for Two To Hawaii
You’[email protected]
Free_trip.pif
Funny email from Jack R.
Win A Trip for Two To Hawaii
Mar 31
29KB
Mar 31
768KB
Hotmail Staff
Increase your email capacity
Mar 30
1KB
[email protected]
Here’s Your
File!
Free_trip.pif
Mar 30
29KB
Mar 30
7KB
Sam Johnson
Did you see the game last night?
Cassandra Love
[email protected],
Call Me.
Mar 30
540KB
[email protected]
You’ve won a free trip to Hawaii.
Dinner with Peg and Alan on 4th?
Mar 30
29KB
Mary Smith
Did you call mom and dad about photos?
Mar 29
19KB
Kyle Lissabet
Win a free computer.
Mar 29
760KB
Download the Attached claim form to register and win your trip !
Hello
Bob Kent
A virus was detected in the file you were attempting to
download.
The attachment/file has been successfully deleted.
Slide 52
2:06
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Anti-Virus izvješća:
- ICAP virus ID
- Crvi prema IP adresi
- ICAP virus IP detalji
- ICAP virus korisnički detalji
Slide 53
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Bob Kent
Slide 54
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Slide 55
Microsoft Internet Explorer
Hello, Bob Kent
This is a message from the IT department.
Your PC has just tried to send information to a known spyware site.
www.gator.com
We have blocked the spyware from sending your personal information out of the organisation (using our
Proxy appliance), however your PC will run more slowly until the spyware is removed.
We are about to redirect you to the spyware removal software to remove this and any other spyware
from your PC, please click on [OK] to start.
For more help, email IT Support Desk or call extension 2875
Provided by Edge Corp IT Support in conjunction with:
Slide 56
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Spyware izvješća:
- Spyware promet
- Zaraženi klijenti
- Blokiran spyware
- Upitne klijentske aplikacije
Slide 57
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Slide 58
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Spyware blokiran na gatewayu
Slide 59
BobK: Hey Martin, what’s the price of model R?
MartinS: It’s £2,500
BobK: Great, thanks
Last message received on 05/04/2005 at 12:58
Slide 60
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Authenticated usernames:
Jednostavan pregled korisničkih web aktivnosti
Pun uvid u IM
komunikacije
Slide 61
Yahoo! – Microsoft Internet Explorer
http://od-msn.msn.com/14/mbr/dtw_underwtrforensics_msn.wmv
Slide 62
10:59
profile: streaming users
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Korisnički profili
Slide 63
profile: streaming users
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
.
bob.kent
mark.johnson
adam.fore
mary.smith
jason.shaffer
ed.ward
jill.edwards
mason.peters
stuart.martin
sara.ashly
Bob Kent: 158.06 MB skinutih
streaming sadržaja
Slide 64
profile: streaming users
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Underwater Forensics show
bob.kent
.
389.90 k
Slide 65
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Slide 66
Statistics for 28/Apr/2005 - 05/May/2005, 9 days
Sumarno izvješće
Content Categories
Software Downloads
Slide 67
Blue Coat Solution Suite
PacketShaper
Application Visibility & QOS
Secure Web Gateway
WAN Optimization
Network Assessment
Malware Prevention
File & Email Acceleration
Network & Application
Performance Monitoring
SSL Visibility and Control
Data/Server Consolidation
Web Content Filtering
Web & SSL Acceleration
Voice & Video Conference
Quality Delivery
Remote Web Control
Rich Media Delivery / CDN
Bandwidth Management
IM & P2P Control
Replication & Backup
P2P Traffic Shaping
Digital Leakage Protection
Live Video Stream Splitting
MPLS Migration
68
ProxySG
Slide 68
Virtualisation and Centralisation
Korak dalje – Akceleracija aplikacija
Multiprotocol Accelerated Caching Hierarchy
Upravljanje Optimizacija
propusnošću protokola
Cache
objekata
Cache
bajtova
Kompresija
File Services (CIFS), Web (HTTP), Exchange (MAPI),
Streaming (RTSP, MMS), Secure Web (SSL), Generic TCP...
Slide 70
Virtualisation and Centralisation
• Centralisation
• Virtualisation
– Eliminate storage arrays in
Remote Offices
– Business-driven
– Business-driven
• Compliance
• Cost
• Cost
• Security
• High availability
• Control
• Power consumption
• Hardware utilisation
Data Center
Storage Centralisation
Remote
Office
71
– Completely abstracting
logical storage from
physical storage
Slide 71
Centralisation with VMWare
• Centralisation and Virtualisation hand-in-hand:
– Moving “physical” servers to a “virtual” Data Center
– Invested in VMware to make this more efficient
• Distance and network characteristics:
– Higher latency, less bandwidth
Virtual DC
– Data transfers are
slower
Bandwidth:
1.5 Mbps (T1)
Latency: 100 ms RTT
– Example data set of 3GB VMware virtual disk file
• Represents 8GB Windows 2003 R2 server
72
72
Slide 72
• Time for V2V via VMware
Converter: 19 mins
Protocols and network
characteristics
• High-level protocols are “chatty”
– TCP, FTP, CIFS and most others
• Network characteristics
– Latency conspires
73
Slide 73
Protocol Acceleration improves
things
• Replaces protocols with a WAN optimized
alternative
– Local acknowledgement
– Larger windows
– Transparent
74
Slide 74
Centralisation, VMWare and Blue
Coat
• Acceleration of:
– Conversions
– Backups / mirrors
• Blue Coat is part of the Technology Alliance
Program
• White Paper and End User presentation
available
75
Slide 75
Basic Return on Investment benefits
• Successful Centralisation and Consolidation
– Faster, more efficient operations
– Benefits not compromised by performance
• More reliable Disaster Recovery
– RPO: Enabled more frequent backups of virtual
servers
– RTO: Faster restoration of virtual servers, limit
downtime
76
Slide 76
Faster V2V Operations
Virtual DC
Bandwidth: 1.5 Mbps (T1)
Latency: 100 ms RTT
77
77
Slide 77
Faster Mirroring and Restores
Virtual DR Site
Bandwidth: 45 Mbps (T3)
Latency: 200 ms RTT
78
78
Slide 78
Quicker Backups of ESX Servers
Bandwidth: 45 Mbps (T3)
Latency: 200 ms RTT
79
79
Slide 79
Bigger Picture
Enterprise Application Delivery
Non-business
Web
CRM / ERP
Transactions
Malware /
Threats
Data CenterFiles
&
Email
Voice / Video
Real Time
Remote
Office
81
Business Web
& SaaS
Slide 81
Identify and Control Traffic
• Identify and contain recreational traffic
– Bandwidth impacting
– Evasive applications
– Dynamic policies
without
Application QoS
• Identify and protect business traffic
– Application-level QoS
– Applications and sub-apps
– Consistent performance
82
Slide 82
with
Application QoS
Apply the right acceleration
investment
• Application performance problems
– Caused by different network and application
characteristics
– Benefit from different WAN Optimization
technologies
Server / storage
consolidation
CIFS, MAPI, TCP protocol acceleration
Byte and Object Caching
Content compression
Voice and
Rich Media
Per-call QoS for voice
Object caching and content pushing for video
Byte caching and feed splitting for streaming media
Business web and
SaaS
HTTPS acceleration
Differentiation between applications and content
Differentiation within applications
–
83
Slide 83
Accelerate business applications
Reduce bandwidth and latency with Object Caching
Reduce bandwidth with Byte Caching
Reduce bandwidth with Compression
Reduce latency with Protocol Optimisation
WAN
ProxySG
84
ProxySG
Slide 84
Acceleration benefits across the
board
85
85
Slide 85
Big Picture Return on Investment
• Control traffic
– Contain recreational traffic, protect business apps
– Reclaim 50% of WAN bandwidth expenditures
• Solve WAN congestion
– Maximize WAN link capacity
– Avoid bandwidth-driven upgrade costs
• Leverage WAN optimization investment
– Understand what business traffic can benefit
– Increase network capacity by 2x-4x and more
86
Slide 86
Summary
Summary
• Virtualisation and Centralisation
– Driven by business goals
• Cost, control and availability
– Problems undermine these goals
• Blue Coat solves those problems
• They exist in the context of a Bigger Picture
– Organisations need to
• Identify and control traffic
• Invest in the right acceleration technologies
• Major Return on Investment with Blue Coat
– Basic ROI benefits: costs and reliability
88
– Big Picture ROI benefits:
Slide 88 costs and performance
Blue Coat Solution Suite
PacketShaper
Application Visibility & QOS
Secure Web Gateway
WAN Optimization
Network Assessment
Malware Prevention
File & Email Acceleration
Network & Application
Performance Monitoring
SSL Visibility and Control
Data/Server Consolidation
Web Content Filtering
Web & SSL Acceleration
Voice & Video Conference
Quality Delivery
Remote Web Control
Rich Media Delivery / CDN
Bandwidth Management
IM & P2P Control
Replication & Backup
P2P Traffic Shaping
Digital Leakage Protection
Live Video Stream Splitting
MPLS Migration
89
ProxySG
Slide 89
Blue Coat Visibility Overview
& PacketShaper Detail
Market & Customer Issues
Blue Coat Visibility & How We Help
AGENDA
PacketShaper Overview
PacketShaper Detail & Management
Solution Focus: Voice & Real Time Apps
Summary
91
91
© Blue Coat Systems, Inc. 2008. All Rights Reserved. Confidential.
Slide 91
Customer Problem - Unknown
Problems
• Key Applications Not Performing
• Network Performance Issues
• Network Takes Blame
• New Apps/Initiatives Planned
92
Slide 92
Tools Deployed Not Good Enough: Slow MTTR
Not Smart Enough
New Demands:
Voice, Video
Reactive
No Ability to Fix
93
• No application view (network based)
• Big problems avoid detection/resolution
• Newly added to converged MPLS networks
• VERY performance sensitive, no tools deployed
• End user complaints
• How do you resolve issues?
Slide 93
Not Smart Enough – Layer 3 & 4 Info
• NetFlow & Probe Based
• 80% HTTP/SSL (Port 80/443)
– SAP, Oracle, Salesforce, Intranet,
Exchange,
– YouTube, iTunes, P2P, Streaming
• Compound Enterprise Apps
– Order entry vs. DB replication
• Difficult to troubleshoot
94
Slide 94
Biggest Causes of Problems Are
Elusive
• Recreation 40-60% of WAN
– Port hop, tunneled, encrypted
– Backhauled over WAN
– Drive out Mission Critical
Intranet
SaaS
(Software as a Service)
Wiki Blog
Shares
95
Slide 95
New Demands Voice & Video
Conference
Unmet Needs for Voice
• Voice Quality
– Mean Opinion Score
(MOS)
• Network Parameters
Unmet Needs for
Voice Monitoring
Nemertes Research
96
Slide 96
– Loss, latency, jitter
• Bandwidth Utilization
Reactive Workflows – No Resolution
End User
Network/NO
C
Helpdesk
Resolution?
• Valid?
• Is SAP slow?
• Which part of SAP?
• Network problem?
• What is causing issue?
• Who is causing it?
• How do I fix it?
Complaint
“Network is slow,
SAP is slow”
• Reactive – End User Starts the Process
– Complaints are main source of “alerts”
– Can’t we track key applications?
• Resolution – how do you fix network problems?
– Shut down user/server?
– Twiddle with ACLs on router?
97
Slide 97
Blue Coat Visibility – Overcome
Limits
• Application View, Fix Problems & Deliver ROI
98
NotClassification
Smart Enough
•
•
•
Layer 7+ Autodiscovers 600+ Applications
Find elusive recreation: iTunes, YouTube, etc.
Break down compound Enterprise apps: SAP, Oracle, Citrix
New
Demands:
Voice
Quality
Voice, Video
•
•
•
Real traffic, in real time for voice and video conf (RTP)
Quality (MOS, rFactor) and Utilization (peak & average)
Jitter, delay, loss
Proactive Response
Reactive
Time Monitoring
•
•
•
Track end user experience – network delay, server delay
Set baselines and exception thresholds
Alert, alarm & integrate: SNMP, XML, Email
FixAbility
Problems
No
to Fix
•
•
•
Apply Powerful QOS & Compression - RESOLVE
Contain recreation, protect mission critical
Integrate with acceleration devices like ProxySG
Slide 98
Visibility Return on Investment (ROI)
• Reclaim bandwidth
– Minimize recreation
– Regain 20-60% of WAN
• Increase Capacity
– 2x-4x WAN bandwidth
increase
• Faster Isolation
– Simplify troubleshooting
– Reduce helpdesk calls
• Insurance
– Assure performance of apps
– Protect infrastructure
investment
99
Slide 99
– Maintain business continuity
How Blue Coat Helps - PacketShaper
•
Install (inline or out of line)
•
Classify - AutoDiscover Applications
•
Measure 120+ stats per class
– Utilization
– End user response – server, network delay
– Voice MOS, Jitter, Delay, Loss
– Diagnostics (TCP Health, Hosts, etc)
•
Resolve Immediately & Build ROI
– Quickly isolate issues
– Repair - QOS: Contain recreation, protect
critical
– Increase capacity 2x-4x – Compression
10
0
Slide 100
Classification: Basis of Control
Classification
Metrics
Usage
RTM
VoIP
Diagnostics
Management
• Discover Applications on Network
• Find Elusive P2P, YouTube, iTunes,
etc
• Break down Oracle, SAP, Citrix,
Microsoft
• Align Class Tree to Business
– Track business processes – end user response
– Monitor SLAs – carrier, internal app
– Monitor utilization/budget per application
– LimitSlide
recreation
101
The Smartest Classification
Technology
Classification
Metrics
Usage
RTM
VoIP
Diagnostics
Management
• Layer 7+ AutoDiscovery
• Validation, Behavior, History, etc.
• Business vs Recreational
• Plug-in Architecture
Slide 102
Application Based Utilization &
Metrics
Classification
Metrics
Usage
RTM
VoIP
Diagnostics
Management
• Top Applications, Users
• Where is WAN Budget
spent?
• Real Time
Troubleshooting
Customer Sees 60% of
WAN is Recreational
• Long Term Capacity
Planning
Slide 103
Response Times: Measure
Transactions
Classification
Metrics
Usage
RTM
• End-user experience
• Network & Server
Delay
• Thresholds for SLA
– Alert, alarm, integrate
Slide 104
VoIP
Diagnostics
Management
Voice Metrics: Real Traffic, Real
Time
Classification
Metrics
Usage
RTM
VoIP
•
Diagnostics
Management
For Real Time Protocol (RTP)
– Voice
– Video Conferencing
•
Call Volume
•
Network Metrics
– Loss
– Latency
– Jitter
•
Quality
– Mean Opinion Score (MOS)
– rFactor
Slide 105
Troubleshooting Diagnostics
Classification
10
6
Metrics
Usage
RTM
VoIP
Diagnostics
Management
•
Host Analysis – Real time host/IP address view (below)
•
TCP Health – Connection state (good, aborted, refused, ignored)
•
PacketCapture – Targeted Capture TCPDump format
•
Synthetic Transactions – HTTP/S, FTP, SMTP, Echo & Custom
Slide 106
Using PacketShaper Information
Classification
Metrics
Usage
RTM
VoIP
Diagnostics
Management
• PacketShaper Onboard Reporting (on-box)
• Adaptive Response – Automate
• Integrate into frameworks
– SNMP, XML & NetFlow
• Blue Coat Central Management
– Central collection & reporting (ReportCenter)
– Centralized policy & administration (PolicyCenter)
10
7
Slide 107
Integrate into Management
Frameworks
Classification
Metrics
Usage
RTM
VoIP
Diagnostics
Management
• Real Time Application View for Existing
Frameworks
– PacketShaper classification intelligence
– Application based – utilization (capacity), response,
diags
– QOS control to fix issues on same platform
• Standardized Interfaces
– SNMP, XML and NetFlow interfaces
– Alarm & trap in existing infrastructure
10
8
Slide 108
Central Management:
IntelligenceCenter
Classification
Metrics
Usage
RTM
VoIP
•
Diagnostics
Management
Centralized Reporting
– Collection (flows or ME)
– Correlation
– Reporting & Alarms
•
SLA Dashboard (left)
– Quick summary app
performance
•
Different Roles & Views
– Per app
– Per site
– Customized portals
IntelligenceCenter
10
9
Slide 109
Central Management: PolicyCenter
Classification
Metrics
Usage
RTM
VoIP
•
Diagnostics
Management
Centralized Policy
– Templates & Group Policies
– Layered & local policies
•
Automated Administration
– Back up configurations
– Distribute software updates
– Access & distribute plug-ins
• Monitor Health & Status
– Asset info
– Status & health
•
Simplify Large Deployments
– 1000 units from single console
11
0
Slide 110
Blue Coat QOS: Fix Problems
•
Smarter:
– Application based
Blue Coat Application QOS Manager
– Identify recreation
•
Granular
– Per application
– Per call, per flow
•
Powerful
– Includes Inbound
– Patented TCP Rate
Control
•
Simple
– On box policy manager
– Centralized PolicyCenter
111
Slide 111
Compression: Increase Capacity
• Real Time
Compression
– RAM Only - Low
latency
– Application specific
– All apps (RTP, UDP,
etc)
• 2x-4x Capacity Gain
– Increase WAN pipe
– Fit more calls, sessions
• ProxySG for Caching!
11
2
– Object caching
Slide 112
Byte caching
PacketShaper Compression
• Byte Cache Libraries
Traffic Type
Service Examples
Algorithm
Remote Desktop
(binary)
Citrix-ICA, GoToMyPC
Email (text)
SMTP-Clear, POP3Clear
ICNA
Enterprise
(binary)
RADIUS-Auth, rsync
CNA
File Server (text)
NetBEUI, Microsoft-ds
CNA
Web
HTTP, SOAP-HTTP
CNA
– Header compression
Text
Telnet-Clear, FTPCmd-Clear
CNA
– Packing
VoIP
Clarent-Voice-S, RTP-I
UDPRT
Instant Messaging
(text)
Lotus-IM-SrvrEx, IRCChat
CNA
Database
Oracle-netv2, MSSQLServer
CNA
ICNA
– RAM-based
– Per application libraries
• Multiple compressors
– CNA, ICNA, UDPRT
– Optimize per app type
• Automatic Backoff
– Revert to “stateless”
– High loss links
– Scale to 1000 tunnels
Slide 113
QOS Limitations: MPLS & Routers
• MPLS Manages Carrier Cloud
– Not CPE LANÆWAN Transition
• Marking Policies Hard
– No application view (IP address,
VLAN)
– No validation
– Complex ACLs
– Tough to provision
• Oversubscription
– Provision real time class
– More calls: overflow
– Add video: overflow
– RED – drop across calls
Slide 114
“For simple environments
aggregate QOS schemes can
work. As voice moves en
masse to WAN – with video –
simple schemes go awry”
Effective QOS
•
Citrix Sub Class
Needs to Be Smart
Voice: RTP-I by Codec
– ID recreational traffic
– Sub-classify compound apps
– Thin Client: Interactive v. Bulk
•
Contain Problems
– Recreation
– Disruptive Enterprise Apps
– **Thin Client Print
•
Contain Disruptive Traffic
Protect Critical
– Application based
Rate
Control!
– Per call QOS
– When aggregates fail
11
5
Slide 115
Provision QOS
Great ERP performance
Protected from apps and
congestion
Voice quality – 100%
assured
all-level QoS
• Contain Disruptive
• Protect Voice
• Mark MPLS
11
6
Slide 116
100% control of
recreational traffic
No matter how much it tries to
hide
Intelligent Marking for MPLS
Networks
DiffServ, MPLS, TOS
VoIP
Bandwidth allocation
SAP
256 Kbps
Email
768 Kbps
Best effort
Slide 117
Classes of Service
PacketShaper Models
Branch Office
Enterprise Core
PacketShaper Product Line
PS900
PS1700
PS3500
PS7500
PS10000
Max Throughput
2Mbps
10Mbps
45Mbps
200Mbps
1Gbps
Maximum Classes
256
512
1024
1024
2048
Max Concurrent Flows
5K
30K/15K
40K/20K
200K/100K
300K/150K
Compression
2Mbps
20Mbps
20Mbps
45Mbps
155Gbps
Max Compression Tunnels
5
15
30
100
1000
Link Speeds with Shaping Options
(bps)
512K, 2M
2M, 6M, 10M
2M, 6M, 10M,
45M
10M, 45M, 100M, 100M, 200M,
200M
310M, 1G
Interface Pairs
2
1
1 + LEM option
1 + LEM option
1 + LEM option
Interface Type
Copper
Copper
Copper
Fiber Options
Fiber Options
Size
Small Form
1U Rack
2U Rack
2U Rack
2U Rack
11
8
Slide 118
Network Assessment
• Also known as:
– Network Performance
Analysis
– Performance Baseline
• Process
– Install PacketShaper:
• Out-of-line: span, mirror,
tap
– Let it run for a few
days/week
– Extract reports and info
– Create recommendation
119
Slide 119
PacketShaper: Asymmetric Core Deployment
Branch
Offices
Centralized Data and
Applications
Core
PacketShaper
WAN
Data
Center
IntelligenceCenter
PolicyCenter
12
0
Slide 120
PacketShaper: Symmetric Deployment
Public Web
Servers
Web Content and
Applications
Centralized Data and
Applications
Internet
Customers and Partners
Branch
PacketShaper
Core
PacketShaper
WAN
Branch
Offices
Data
Center
IntelligenceCenter
Branch
PacketShaper
PolicyCenter
12
1
Slide 121
Employees
ProxySG Classification Plug In
•
Blue Coat Has Acceleration
– CIFS Acceleration, Byte
Caching
– Magic Quadrant Leader
•
Blue Coat Accelerates More
– Streaming/Rich Media
– Web SSL
•
ProxySG is best acceleration,
– ProxySG Classification PlugIn:
– Visibility for Accelerated Apps
PacketShaper Classification Plug-In
for Blue Coat ProxySG
12
2
Slide 122
Product Suite to Integrated ADN
Blue Coat Application Delivery Networks
Visibility
• 54+ million Web URLs
Full Web/SSL Visibility
Discover Applications
PacketShaper
Assess & Monitor
Performance
• Discovery
& Classification
• Performance Monitoring
•Troubleshoot
Granular QOS & Report
• RAM-based Compression
Best in World Classification
Acceleration
Security
ProxySG
• Byte Caching & Compression
WAN Optimization
• Protocol Acceleration
• Object Caching & Pipelining
Web Cache &
• Content Delivery Network (CDN)
• QOS Acceleration
• Streaming Acceleration
TrafficWeb
Control
• Asymmetric
& SSL
• Direct to Net Recreation Control
Real
Time
Applications
Magic
Quadrant
Leader
Voice, Video Conf, Thin Client
WAN Recreational Control
Slide 123
•Web
URL &Content
Content Filter
& URL
• Malware Protection
Filtering
• Authentication
• Policy Control
Malware Protection
• Advanced security proxies
• Cloud Service Redirect
Real-Time Cloud
Protection Service
Magic Quadrant Leader
Blue Coat Solution Suite
PacketShaper
Application Visibility & QOS
Secure Web Gateway
WAN Optimization
Network Assessment
Malware Prevention
File & Email Acceleration
Network & Application
Performance Monitoring
SSL Visibility and Control
Data/Server Consolidation
Web Content Filtering
Web & SSL Acceleration
Voice & Video Conference
Quality Delivery
Remote Web Control
Rich Media Delivery / CDN
Bandwidth Management
IM & P2P Control
Replication & Backup
P2P Traffic Shaping
Digital Leakage Protection
Live Video Stream Splitting
MPLS Migration
124
ProxySG
Slide 124
Full Spectrum Acceleration: Blue
Coat
Bulk Data Services
Web & SSL Applications
Rich Media
External Applications
Real Time Applications
Files, Email, Backup
Enterprise Apps, ERP/CRM, Intranet
Live Casts, Training Video, Streaming Media
SaaS/Business Web, Recreation, Malware
Voice, Video Conf, Thin Client, Transactions
Slide 125
Blue Coat Acceleration Benefits
Bulk Data Services
Web & SSL Applications
Accelerate 15-40x (up to 300x)
Reduce Bandwidth 50-99%
Speed 15-25x, reduce bandwidth 30-99%
Securely Mediate SSL through PKI Integration
Rich Media
Multiply Bandwidth 100-1000x
Deliver Streaming & Live Video over Existing Links
External Applications
Business Web 15-50x Faster, Reduce Bandwidth
Reduce Recreation 90% Enforce Policy & Secure
Real Time Applications
Reduce Jitter & Delay by 60%
Enable Convergence, Thin Client & VDI
Slide 126
IBM Forum
16. Septembar 2010., Sarajevo
HV
AL
A
Aplication Delivery Network (ADN)
Mreža za isporku aplikacija
Saša Mandžukić
Emerging Markets Consultants
[email protected]
www.emc.ba
033 789 480