KEMP Technologies Hybrid Solutions - Itway Group · KEMP Technologies Hybrid Solutions New York:...
-
Upload
duongduong -
Category
Documents
-
view
217 -
download
1
Transcript of KEMP Technologies Hybrid Solutions - Itway Group · KEMP Technologies Hybrid Solutions New York:...
KEMP Technologies Hybrid Solutions
New York: 631-345-5292 • Limerick: +353-61-260-101 • Hannover: +49-511-367393-0 • Singapore: +65-62222429
Multitenancy is a reference to the mode of operation of software where multiple independent instances of one or multiple applications operate in a shared environment. The instances (tenants) are logically isolated, but physically integrated.
Application Users
MS ADFS Servers
Office 2010 Online SharePoint Exchange Online SQL Server/Data
Exchange Servers
MS Terminal Services
MS “Power of Choice”
Cloud Strategy
Exchange Servers Lync
Servers
LM-DR/Geo
LM-DR/Geo
OAS Servers
How KEMP fits as part of Microsoft Workloads Azure Cloud Platform PaaS and IaaS Services
KEMP Technologies Confidential
Azure Load Balancer KEMP VLM for Azure
Application-Aware L7 load balancing
No Yes
High Availability Yes using Traffic Manager Yes using GEO
Application for Hybrid Scenario No Yes using GEO
Balancing methods Round Robin Only L4 / L7
Server persistence No L4 / L7 (Cookie and more)
SSL Termination/Offload No Yes
VM Resource Availability Awareness
No Yes
Azure Load Balancer Only vs. Azure Load Balancer + VLM for Azure
Some Typical Use Cases
• Load Balancing SharePoint 2013 on Azure
• Load Balancing RDS on Azure
• High Availability with ADFS on Azure for Single Sign-On
• Custom SSL Web Applications
• Sharing single IP for Multiple workloads
KEMP Technologies Confidential
LoadMaster for Azure Supports:
• L4/L7 Server Load Balancing
• Complete Restful API for Orchestration
• PowerShell API for Orchestration
• Content Switching
• SSL Offloading/Acceleration
• SSL Termination & Re-encryption
• Cookie (L7) Persistence
• Server Health Monitoring
• Service “Aware”
• Header Re-write
• L7 Transparency
• Caching, Compression
• Application-specific Templates
• Edge Security Pack • Pre-Auth
• Single Sign-on
KEMP Technologies Confidential
Multi tenancy allows better utilization of large hardware platforms where density of instances is more important than raw performance from a single instance.
LB 1 LB 2 LB n ..… Virtualized Networking (L2/L3)
Multi-tenant Management UI
“Some” Hypervisor Typically not exposed to Admin.
A “big” piece of LB hardware
VLM WAF WOC ..… Virtualized Networking (L2/L3)
KEMP MT Management UI
GA targeted for July-August
Phase 2
Complete multi-vendor ecosystem, supporting KEMP and 3rd party VNFs.
Key Differentiators Software Solution vs Proprietary H/W Deploy Best-of-Breed NFVs True Pay-as-you-Grow “Infinitely” Scalable Service Chaining Pre-built Broad range of target markets
o (MxP, Data Center, SME, Enterprise)
KEMP Application-on-Demand Delivery Framework
KEMP Service Control Point
LoadMaster ADC
KEMP Cloud Scalar
Bare Metal: Cisco UCS, Dell, HP, Oracle
Oracle, SAP, Exchange, Lync etc.
Condor HyperFlex Architecture (HFA)
GEO Firewall WOC
SDN-ready NFV Container
Microsoft System Center
VMware Others Orchestrators supported by KEMP Plug-ins
WAF
Application Workloads
WOC NFV SaaS NFV Application Layer
KEMP Certified 3rd
Party KEMP NFV Hybrid Key
OpenStack
Service Chaining Processes • Stand alone physical appliances
• Service provisioning by connecting physical wires or via complex VLAN configuration. Individual address configuration. Additional power and space requirements.
• Stand alone virtual appliances • Service provisioning via deploying individual appliances then configuring Ethernet
interfaces with addresses, adding overlay networks or tunneling configuration
• Chained virtual appliances via Condor • Deploy virtual appliance instances from templates, determine appliance order in the
service chain using the chain builder and pressing Start will automatically add the correct Ethernet interfaces and provision all the pipes to setup the networking configuration
Better utilization of HW resources
IP’s for devices can be private as they are within the Service Chain and not visible externally
Traffic can be decrypted once based on use case!
Easy deployment within the Montana Platform
Benefits of Service Chaining
Condor Screen Shots