Load balancer dedicated devices, which are available from many companies. The use of specialized hardware equipment provided by specialized companies is very valuable to many companies with specific requirements, such as banking, telecommunications and other industries, but hardware aging speed is too fast, feel a device has not started to use, it is going to enter the recession period. I also vaguely remember that when I purchased F5 in the BDC project, it was early 08, and now the equipment is ready to be scrapped.
In the blink of an end, as if to remember the first time to the core room, at that time, many claims that the world advanced, domestic first-class 64 machines, have entered the scrap link, that a tuo Tuo modernized East, have become scrap metal.
The hardware is good, but the scrap is quick.
To go to the bottom, look at the F5 some information for reference.
F5 is the global leader in the field of application delivery networks (ADN), with global market share first. It is dedicated to helping large enterprises and service providers around the world realize the business value of virtualization, cloud computing and "on demand" it. F5 is headquartered in Seattle, WA and has branches around the world.
Product Technical Features:
1) Load balancing support more comprehensive
Big-IP LTM (local traffic management) includes static and dynamic load balancing methods, including dynamic rate, least-connection, and observed-mode homeostasis, which are used to track the dynamic performance of the server in a holistic manner. This ensures that the best resources are always selected to improve performance. All TCP/IP protocol -based server load Balancing can be supported. Load balancing algorithms such as minimum number of connections, polling , scale, fastest response, hashing, prediction, observation, and dynamic scaling are supported.
2) Application Status monitoring
A monitor provided by big-IP LTM to check the availability of devices, applications, and content, including dedicated monitors for multiple applications (including multiple application servers, SQL, SIP, LDAP, Xml/soap, RTSP, SASP, SMB, etc.) and a custom monitor for checking content and simulating application calls.
3) High availability and transaction protection
Big-IP LTM provides sub-second system failover and full connectivity mapping to ensure it is a highly available solution regardless of system, server , or application failure. Big-IP LTM can proactively detect and respond to any server or application error.
4) Support Nat Address Translation
Provides NAT address translation capability to enable dynamic or static address translation.
5) Support Access Control List
Can implement the basic function of the firewall, establish an access control List , reject the IP network segment or port number.
6) Wide Area traffic Manager ( plug-in module )
Provides high availability, highest performance, and global management for applications running in multiple datacenters around the world .
7) Link controller (plug-in module)
Seamlessly monitor the availability and performance of multiple WAN connections, intelligently manage two-way traffic to your site, providing fault-tolerant, optimized Internet access . such as the management of CT and CNC control network traffic .
8) Application Firewall (Plug-in module)
The module can be added to the F5 device, providing more advanced security services for the device.
9) Support Routing
This feature is essential for F5 devices, but only static routes are supported, and if you use a more advanced OSPF Routing protocol , you need to purchase a separate module to support it.
Extended application-Reduces server load
1) Content Conversion
Big-IP LTM provides a comprehensive solution for offloading many complex or repetitive functions to a centralized, high-performance network device. SSL, compression, and many other features of big-IP LTM provide a complete content transformation Gateway that redirects, inserts, or fully transforms application content for efficient and efficient application integration .
2) OneConnect
The F5 Oneconnect aggregates millions of requests into hundreds of server -side connections, ensuring that the backend system is able to handle these connections efficiently, thereby increasing the server capacity by 60%.
3) Cache
The smart cache feature enables significant cost savings by offloading recurring traffic from the Web and application servers to increase server capacity by up to 9 times times. This feature is also the only solution in the industry that provides multi-repository caching, and can manage different cache libraries for applications or departments, providing precise, intelligent control for high-priority applications.
4) SSL acceleration and uninstallation
Each big-IP LTM device provides hardware-accelerated SSL encryption to eliminate the SSL burden on the application server. By accelerating setup and bulk encryption, businesses can migrate all communications to SSL with a more secure password, with little or no performance degradation or bottlenecks.
Optimized applications
1) Intelligent Application Exchange
The big-IP LTM has the unique ability to read all of the IPs applications, so it can transform and retain unique information about the specific vendor's application server (Microsoft, IBM, Oracle, Sun, etc.), the XML data for the Web Service application, or the indication that the mobile/ Custom values for wireless applications. Your enterprise can achieve greater reliability and scalability with the ability to transform, record, and persist payload or data streams with big-IP LTM.
2) Smart Compression
Increase the application performance to 3 times times, while reducing the bandwidth usage by 80%. Reduce HTTP traffic using industry-standard gzip and deflate compression algorithms, reduce bandwidth consumption with slower/lower bandwidth connections, and shorten user download times. This capability provides rich support for compressing multiple types of files, including HTTP, XML, JavaScript, and Java EE applications.
3) Flexible 4th to 7th floor Flow Rate Control
Ensure optimal application performance by assigning bandwidth to higher-priority applications, controlling traffic spikes, and prioritizing traffic based on 4th or 7th-level parameters. This is the QoS feature enabled by the IDC room on the core switch .
4) TCP Express
Highly optimized TCP/IP stack for big-IP LTM (called tcpexpress?) The improved functionality of TCP/IP technology and the latest RFC, combined with the many improvements and extensions developed by F5, minimizes the impact of congestion, packet loss , and recovery. The big-IP LTM is an all-agent device, so TCP Express can mask and transparently optimize the existing or incompatible TCP stacks running on the server or client . This can increase user performance by up to twice times and increase bandwidth efficiency by 4 times times while reducing the connection load on your server .
Secure applications
1) Basic Firewall Function-- Packet filtering
Big-IP LTM integrates a control point that defines and executes layer 4th based filtering rules (based on pcap, similar to a network firewall ) to improve network protection capabilities.
2) resource hiding and content security
Big-IP LTM virtualize and hides all applications, server error codes, and True URL references, as these can provide hackers with information about infrastructure, services, and their associated vulnerabilities. Sensitive documents or content will not be allowed to leave your site.
3) custom application attack filtering
A comprehensive detection and event-based strategy provides significantly enhanced capabilities for searching, detecting, and applying multiple rules to block known 7th-level attacks. Big-IP LTM also uses secure application templates to block known attacks and attacks on application business logic. An additional layer of security protects against hackers , viruses , and worms while providing ongoing service for legitimate traffic.
4) Isolation Protocol attack
The big-IP LTM provides protocol-friendly processing (Protocol sanitization) and full TCP termination (fully TCP termination) points to manage client and server -side connections separately, To protect all back-end systems and applications from malicious attacks.
5) cyber attack Protection
Big-IP LTM acts as a security agent to protect against Dos attacks, SYN flood, and other network-based attacks. Features such as Syncheck can provide comprehensive SYN flood protection for servers deployed behind big-IP devices. Big-IP LTM uses the dynamic reaping (an adaptive method for getting idle connections) to filter out the most heavily loaded attacks while providing uninterrupted service for legitimate connections.
6) Selective encryption
Big-IP LTM provides the industry's most selective encryption method for overall, partial, or conditional encryption of data to protect and optimize communication between different users.
7) Cookie Encryption
Cookies and other tokens that are transparently assigned to legitimate users are encrypted. Enterprises have access to superior security for all stateful applications ( e-commerce , CRP, ERP, and other business-critical applications), as well as higher user identity Trust.
8) Advanced SSL Encryption Standard
Big-IP LTM uses the safest SSL encryption Technology on the market to support higher-standard AES algorithms without the need for additional processing costs.
9) Grab Bag Tool
The Tcpdump tool is provided as a packet-capture analysis, which can be used in the direction of fault handling, flow analysis, etc.
F5 of load Balancing hardware