SonicWALL WXA – WAN Acceleration

Slides:



Advertisements
Similar presentations
Deloitte Technology Fast 500 Asia Pacific Winners Accelerating Your Network WACC Technology.
Advertisements

Enabling Secure Internet Access with ISA Server
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
1. 2 Branch Office Network Performance Caches content downloaded from file and Web servers Users in the branch can quickly open files stored in the cache.
NLIT 09 Presentation Page 1 Vision – Service – Partnership Page 1 WAN Acceleration Using Cisco WAAS Robert Morrow National Security Technologies LLC
Why It’s Time to Upgrade to a Next-Generation Firewall
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
Module 5: Configuring Access for Remote Clients and Networks.
Solutions Road Show 2014 March’ 2014 | India Protection from Next Gen Threats Pralobh Menon Sales Engineer DELL SonicWALL (South) Pralobh Menon Dell India.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat ® and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Module 3 Windows Server 2008 Branch Office Scenario.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
MSIT 458: Information Security & Assurance By Curtis Pethley.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Citrix Partner Update The Citrix Delivery Centre.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Challenges in Network Security 2011 SonicWALL Inc.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
Secure your users Accelerate your data.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Course 201 – Administration, Content Inspection and SSL VPN
Barracuda Load Balancer Server Availability and Scalability.
Chapter 7: Using Windows Servers to Share Information.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Network Edge Protection: A Technical Deep-Dive into Internet Security & Acceleration Server
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
1 Veloxum Corporation © Veloxum ACO solution improves the efficiency and capacity of your environment for both physical and.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
1 F5 BIG-IP and NetApp FlexPod F5 is a NetApp Advantage Alliace Partner with continuous engagement across teams in product management, product development,
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Link Balancer
Securing the Network Perimeter with ISA 2004
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
UDgateway WAN Optimization
Introducing ProxyClient
Dell SonicWALL WAN Acceleration (WXA) Overview
Introduction to Dell SonicWALL WAN Acceleration
IS 4506 Server Configuration (HTTP Server)
File Transfer Issues with TCP Acceleration with FileCatalyst
Ron Carovano Manager, Business Development F5 Networks
Presentation transcript:

SonicWALL WXA – WAN Acceleration Dennis Bergström, CISSP SonicWALL Nordic Technical Account Manager/SE

SonicWALL, Inc. Dynamic Security for the Global Network

SonicWALL, Inc. Dynamic Security for the Global Network

SonicWALL’s Legacy

Not only Next-Generation Firewalls – although they rock of course SuperMassive™ E10000 Series E-Class NSA Series NSA Series TZ Series Data centers, ISPs E10100 E10200 E10400 E10800 Medium to large organizations NSA E8510 NSA E8500 NSA E7500 NSA E6500 NSA E5500 Branch offices and medium sized organizations NSA 4500 NSA 3500 NSA 2400MX NSA 2400 NSA 240 Small and remote offices TZ 210 Series TZ 200 Series TZ 100 Series

SonicWALL Product Line-up Network Security WAN Acceleration Secure Remote Access Email Security Backup and Recovery Policy & Management SSL VPN Client App Intell & Control Clean Wireless – SonicPoint-N Series Connect Mobile Spike Access Advanced Reporting Native Access Modules Virtual Assist Virtual Access Web App Firewall Spike Access

SonicWALL WXA Series WXA 500 Live CD WXA 2000 WXA 4000 WXA 5000 Copyright 2011 SonicWALL Inc. All Right Reserved

What Does WAN Acceleration Do? Improve Performance of Business Applications Optimize Response Times for Critical Applications Reduce Bandwidth Consumption Reduce associated Bandwidth Costs … Make the network appear faster! Copyright 2011 SonicWALL Inc. All Right Reserved

Have you ever… …Collaborated with someone on a huge PowerPoint document with 10-15 revisions and passed the document back and forth? Did the collaboration over a slow internet connection? …Accessed a large document on a shared site multiple times and downloaded the whole file every time? Redundant data sent back and forth results in waiting, wasting bandwidth and productivity loss. SonicWALL CONFIDENTIAL All Rights Reserved

There is a need for WAN Acceleration Outpaced by Growing Bandwidth Requirements Traditional QoS Ineffective Application Latency Redundant Traffic Consuming Bandwidth Copyright 2011 SonicWALL Inc. All Right Reserved

Two front assault – the SonicWALL way Traffic Shaping Ensure “Good Traffic” Composition Block Unwanted Traffic Utilize Bandwidth Effectively Traffic Acceleration Traffic De-duplication WFS Caching Protocol Optimization SonicWALL CONFIDENTIAL All Rights Reserved

WAN Acceleration Step 1 – Shape! Bandwidth manage and control applications SonicWALL Application Intelligence, Control and Visualization 1550+ Applications (3600+ signatures) Identify Applications Prioritize important traffic Block or restrict unimportant traffic Goal: “Good Traffic” at the gateway with Application Intelligence & Control SonicWALL CONFIDENTIAL All Rights Reserved

Shape! – Choose your traffic Important Apps Unimportant Apps

Shape! - Application Intelligence Identify Categorize Control Users/Groups Policy Critical Apps Application Chaos Reassembly-Free Deep Packet Inspection Acceptable Apps Ingress Egress Unacceptable Apps Cloud-Based Extra-Firewall Intelligence Malware Blocked

Shape! – Get immediate insight for decisions

Shape! – Get your users to love you….

WAN Acceleration Step 2 – Accelerate! Extremely Effective on: Email, PowerPoint, Excel spreadsheets, Word docs, PDF SharePoint, Collaboration sites Files between 20Kb-20MB+ Small Localized Changes Benefits: Eliminate redundant traffic Increase responsiveness Improve user experience SonicWALL CONFIDENTIAL All Rights Reserved

How does it really work? Protocol Optimization Reduce the chattiness of certain protocols like (WFS) Optimizes protocols like Windows File Sharing (WFS), FTP, email Makes an intelligent decision about the nature of the traffic to eliminate latency Decreases round-trips and chattiness of certain protocols Before: WAN Acceleration With: WAN Acceleration SonicWALL CONFIDENTIAL All Rights Reserved

How does it really work? WFS Acceleration Decrease the amount of data to be sent across the WAN = Improves response times and transfer speeds when transfer files between remote locations. File caching/de-duplication Metadata caching (File directory information) Active Directory Integration (The WXA becomes part of the domain) SonicWALL CONFIDENTIAL All Rights Reserved

How does it really work? Understanding Byte-Caching Without Byte Caching: 1 MB Change, Transfer Everything Total: 125 Sec = 2 Min, 5 Sec 8 MB / 1 Mbps = 62.5 Sec* 8 MB / 1 Mbps = 62.5 Sec (1 Mbps = 1024 Kbps; 1024 Kbps / ( 8 Bits/Byte) = 128 Kbytes/Sec.; 8 MB = 8192 Kbytes; 8192/128 = 62.5 Sec.) SonicWALL CONFIDENTIAL All Rights Reserved

How does it really work? Understanding Byte-Caching WITH Byte Caching: 1 MB Change, Transfer only the Change Total: 70.5 Sec = 1 min, 10.5 Sec 50.5 Second Saving = 40% Savings 8 MB / 1 Mbps = 62.5 Sec 1 MB / 1 Mbps = 8 Sec (1 Mbps = 1024 Kbps; 1024 Kbps / ( 8 Bits/Byte) = 128 Kbytes/Sec.; 8 MB = 8192 Kbytes; 8192/128 = 62.5 Sec.) SonicWALL CONFIDENTIAL All Rights Reserved

How does it really work? Byte Caching The WXA appliance builds and maintains dictionaries based on most commonly passed traffic Data is replaced with tokens that the remote WXA can use to recognize and reconstruct data WXA Series CONVEYS data across the WAN link. SonicWALL CONFIDENTIAL All Rights Reserved

How does it really work? What cannot be accelerated… De-duplication/Byte-Caching Acceleration relies on detecting repetition 1) Within a single file/stream 2) Within a network Repetition signals an opportunity to optimize and accelerate. However, some traffic cannot be accelerated Traffic that does not repeat High-entropy traffic (Hint: These two types of traffic are connected) SonicWALL CONFIDENTIAL All Rights Reserved

How does it really work? What cannot be accelerated… High-Entropy Traffic Non-Repeating Traffic Encrypted traffic SSL, IPSec Compressed traffic GZIP, RAR, 7zip, bzip Video, Audio Already optimized traffic RDP, Citrix Single file in one direction sent once Single web page access (High-Entropy Traffic) SonicWALL CONFIDENTIAL All Rights Reserved

This is how we do it! Simple Two-Site Deployment Result Traffic between two sites optimized with minimal configuration SonicWALL CONFIDENTIAL All Rights Reserved

You already know this!.... WXA Management through host SNWL firewall interface. Firewall Takes Care of Auto provisioning of the WXA hardware or software solution (similar to SonicPoints) WXA license management Firmware and configuration managed of the WXA appliance Health check probes of the WXA appliance Consolidated management Application Control Deep Packet Inspection Wan Acceleration

…and its really simple to get started! Firewall decides what traffic needs to be accelerated Default is “everything” that we can accelerate Benefit: Decreases the amount of data sent over to the WXA for processing SonicWALL CONFIDENTIAL All Rights Reserved

Show me the money! Visualizes the benefits of using WAN Acceleration SonicWALL CONFIDENTIAL All Rights Reserved

SonicWALL WXA Series WXA 500 Live CD WXA 2000 WXA 4000 WXA 5000 Copyright 2011 SonicWALL Inc. All Right Reserved

SonicWALL WXA Series Overview Min. SonicOS Version 5.8.1 Recommended Users1 20 120 240 360 Max WAN Accel Flows 100 600 1200 1,800 Byte Caching Yes TCP Acceleration Compression WFS Acceleration Yes2 Visualization TCP/WFS Copyright 2011 SonicWALL Inc. All Right Reserved

Choose anyone of these – they all speak WXA! SuperMassive™ E10000 Series E-Class NSA Series NSA Series TZ Series Data centers, ISPs E10100 E10200 E10400 E10800 Medium to large organizations NSA E8510 NSA E8500 NSA E7500 NSA E6500 NSA E5500 Branch offices and medium sized organizations NSA 4500 NSA 3500 NSA 2400MX NSA 2400 NSA 240 Small and remote offices TZ 210 Series TZ 200 Series TZ 100 Series

Dennis Bergström, CISSP SonicWALL Nordic Technical Account Manager/SE Thank you… Dennis Bergström, CISSP SonicWALL Nordic Technical Account Manager/SE