Microsoft Windows Server 2008 R2 P7305128 User Manual

APPLICATION READY NETWORK GUIDE  
MICROSOFT WINDOWS SERVER 2008  
Comprehensive Application Ready infrastructure that enhances the security,  
availability, and performance of Microsoft Windows Server 2008 deployments  
F5 APPLICATION READY NETWORK GUIDE: MICROSOFT WINDOWS SERVER 2008  
Benefits and F5 Value  
are ready for this inevitable change. With  
control of Windows Server 2008. This takes  
the workload off of the Windows Server 2008  
devices for increased server efficiency. By  
reducing unnecessary protocol communication  
across the network, F5 improves application  
response times and utilization for Windows  
Server 2008 deployments and other  
User Experience and  
Application Performance  
F5’s IPv6 support, organizations have a clear  
strategy for staging network migration as IPv6  
traffic grows, without wholesale network and  
application upgrades. Additionally, F5 devices  
can perform IPv6/IPv4 translation, translating  
traffic for consumption by either IPv4 or IPv6  
end points. This allows organizations to stage  
their migration gradually as demand for IPv6  
increases. F5 enables you to freely intermingle  
IPv4 and IPv6 services on Windows Server  
2008; for example, F5 can serve as an IPv4  
front end to Windows Server 2008 Web  
Access servers that only use IPv6. With F5,  
organizations have a strong solution for today  
and well into the future.  
Microsoft Windows Server 2008 gives  
organizations a powerful new platform that  
is designed to power the next-generation of  
networks, applications, and Web services.  
Windows Server 2008 includes some exciting  
new components such as Microsoft’s new  
TCP/IP stack, Secure Socket Tunneling Protocol  
(SSTP), and new versions of industry standard  
applications like Windows Terminal Services  
and Internet Information Services. F5 has been  
working closely with Microsoft to ensure that  
F5’s Application Ready Network for Microsoft  
Windows Server 2008 provides the highest level  
of application availability, performance, and end  
user satisfaction.  
applications on the network.  
Even high-powered and efficient applications  
and servers, like Windows Server 2008, as well  
as other devices on the local area network  
(LAN), are not much help over the wide area  
network (WAN). Network latency across the  
WAN is one of the biggest challenges facing  
IT departments around the world, and is a  
major concern for organizations deploying  
applications like Windows Terminal Services  
where users can access applications from  
anywhere. Simply increasing bandwidth  
Windows Server 2008 is extremely effective  
at what it was designed to do: provide a solid  
foundation for server workload and application  
requirements. One of F5’s core strengths is the  
ability to enhance end-user experience while  
increasing application and server performance.  
We do this by taking on many of the duties  
that servers traditionally have to perform. If  
each server has to carry out processor-intensive  
tasks such as compression, caching, and SSL  
processing and certificate management, the  
amount of processing power these devices  
have left to perform core tasks is reduced.  
By offloading these types of tasks onto F5’s  
centralized and high powered network devices,  
F5 greatly improves Windows Server 2008  
server efficiency and enables organizations to  
reduce the amount of hardware. This applies to  
all the major components of Windows Server  
2008, including Windows Terminal Services,  
Internet Information Servers, and SSTP.  
One of the highlights of Microsoft Windows  
Server 2008 is a next generation TCP/IP stack  
that has been completely redesigned from  
the ground up. F5 solutions include a host  
of TCP/IP optimization technologies that are  
compatible with Microsoft’s new stack. These  
optimizations, which combine session-level  
application awareness, persistent tunnels,  
selective acknowledgements, error correction,  
and optimized TCP windows, enable F5 devices  
and Microsoft Server 2008 installations to fully  
utilize available bandwidth. This enables F5  
devices to adapt, in real time, to the latency,  
packet loss, and congestion characteristics  
of WAN links, and accelerate virtually all  
application traffic. And F5 isolates, controls,  
and independently optimizes user and server  
connections, enabling both the server and end  
user to maximize productivity.  
does nothing to solve the problem. F5 helps  
drastically reduce the impact of latency in a  
number of ways. In addition to the benefits  
from TMOS, F5 solves latency problems with a  
group of capabilities that eliminates the need  
for the browser to download repetitive or  
duplicate data, as well as ensuring the best use  
of bandwidth by controlling browser behavior.  
By reducing the extra conditional requests  
and excess data (re)transmitted between the  
Windows Server is one of  
the most popular application  
platforms that we see within  
our enterprise customer  
base. As such, F5 has put  
substantial resources into  
testing its application delivery  
portfolio with the Windows  
Server platform technologies  
through every step of the  
beta to maintain a high level  
of interoperability.”  
F5 provides technology that guarantees the  
most efficient network possible. Because  
F5’s unique TMOS™ operating system is a  
full proxy, it can optimize any end point that  
connects through the system. As a full broker  
of communications, the system optimizes  
communication for every single end-device  
communicating through it. This optimization  
can take place up and down the entire stack  
— from the transport layer to the protocol  
and application layer — functions outside the  
With the rapid expansion of the Internet  
and the quickly diminishing number of IPv4  
addresses available, organizations are looking  
to ensure their network infrastructure is  
adequately prepared for the future. Internet  
Protocol version 6 (IPv6) support is no longer  
a luxury, it is a necessity. IPv6, a new suite  
of standard protocols for the network layer  
of the Internet, is built into both Windows  
Server 2008, as well as F5 devices, ensuring  
that your network and Microsoft applications  
Jim Ritchings, VP of Business  
Development at F5  
3
F5 APPLICATION READY NETWORK GUIDE: MICROSOFT WINDOWS SERVER 2008  
Benefits and F5 Value  
browser and the web application, F5 mitigates  
the effects of WAN latency, networking errors,  
and packet loss.  
security model. However, IPS/IDS systems could  
stateful applications and a higher level of user  
identity trust.  
only protect against a known list of attacks  
and signatures, and soon attacks became more  
sophisticated, with zero-day attacks that would  
bypass these systems as their signatures were  
previously unknown. Recently, hackers are  
shifting their focus to applications themselves  
with attacks that look harmless to both network  
firewalls and intrusion protection/detection  
systems. More than 50 percent of all new  
vulnerabilities being identified on a weekly basis  
are attributed to web applications2.. Devices  
relying solely on a known list of signature attacks  
cannot defend against targeted attacks involving  
a malicious user seeking vulnerabilities unique to  
a particular application. F5 detects and mitigates  
patternless exploits in real time, adding accurate,  
complementary protection to existing firewalls  
and IDS devices, which do not efficiently address  
HTTP and HTTPS-borne threats.  
F5 includes extremely granular endpoint security  
for remote users connecting to the network  
and to Windows Server 2008 servers and  
applications. Before a remote user can even  
log on to the F5 devices to gain access to the  
network, F5 can determine if an antivirus or  
personal firewall is running on their PC and if  
it is up-to-date, or enforce a specific operating  
system patch level, among a host of other  
pre-logon checks. F5 can direct the user to a  
remediation page for further instructions or  
even turn on antivirus or firewalls for the user.  
F5 remote access also supports two-factor  
authentication from leading vendors for those  
organizations that require more than just a user  
name and password for access to the network.  
And F5’s remote access solution can be easily  
integrated with Active Directory, providing  
centralized authentication.  
One of the strengths of the F5’s Application  
Ready Network is the wide variety of materials  
that ease the burden of configuring and  
optimizing our devices, freeing valuable IT  
resources to work on other projects. As part of  
the Application Ready Network for Microsoft  
Windows 2008, F5 has configured, tested, and  
tuned our devices with the major components  
of Windows Server 2008 and carefully  
documented the procedures in our Deployment  
Guide. F5 also provides configuration Profiles  
and Policies to make configuration incredibly  
simple yet powerful and flexible, with some  
policies including prebuilt drop-downs for  
components like Microsoft Internet Information  
Services and Windows Terminal Services.  
And now with our management devices,  
the deployment guide configuration files are  
available as a template, which can be easily  
uploaded and pushed to F5 devices. With the  
power of Microsoft PowerShell, the command  
line shell and scripting language included  
with Windows Server 2008, and F5’s iControl  
PowerShell Cmdlets and scripts, developers  
have a unique way to control and manage F5  
devices in one location1.  
In addition to analyzing and blocking known  
attack signatures, F5 can strip out identifying  
operating system and web server information  
(such as version strings, signatures, and  
fingerprinting) from message headers, conceal  
any HTTP error messages from users, and  
remove application error messages from pages  
sent to users while checking to ensure no server  
code or private HTML comments leak onto public  
web pages.  
When the remote user is finished working with  
their remote access session, F5 includes a cache  
cleanup control that removes cookies, browser  
history, auto-complete information, browser  
cache, temp files, and all ActiveX controls  
installed during the remote access session  
from the client PC. This makes ensures that no  
information is left behind, which is critical for  
users connecting from public computers, such  
as a kiosk.  
And attacks do not always come from the  
outside of the network; internal users can gain  
sensitive information or sabotage applications  
with greater ease than external users. Because  
F5 devices can offload SSL encryption duties,  
organizations can encrypt traffic for entire  
transactions, without affecting performance for  
the end user. This prevents information from  
being sent in clear text over the internal network,  
mitigating risks associated with internal users  
as well as complying with state and federal  
regulations related to privacy.  
Application Security  
Not only does F5 provide comprehensive  
application security, but we produce extremely  
secure devices. We ensure your Windows  
Server 2008 deployment, and the information it  
contains, remains completely secure.  
While performance and end-user experience  
are vital to a successful deployment of Windows  
Server 2008, ensuring application security  
can be even more crucial. Because of the  
sensitive nature of data stored in applications  
and databases, coupled with new compliance  
initiatives and government regulations on data  
protection, securing your applications is more  
important than ever before. F5 security solutions  
provide comprehensive protection for Windows  
Server 2008, ensuring your data and applications  
are secure.  
Unified Security Enforcement  
and Access Control  
Another integral piece of a complete security  
platform is security enforcement and access  
control. The number of employees requiring  
access to corporate resources from outside  
the network is growing every year. And it’s  
not only employees who need access to the  
network. With more business-to-business  
F5 devices also protect against attacks that use  
cookies and other tokens that are transparently  
distributed for their entry point. F5 devices can  
be easily configured to encrypt cookies used  
by Windows Server 2008, preventing cookie  
tampering and other cookie-based attacks.  
This gives organizations superior security for all  
Years ago, merely having network firewalls in  
front of the LAN was considered an adequate  
level of security. Next came intrusion protection/  
detection systems, which added another level  
of security, albeit one that provided a negative  
1 For more information on iControl and Microsoft PowerShell integration, see http://devcentral.f5.com/Default.aspx?tabid=71  
2 SANS@RISK, “The Consensus Security Vulnerability Report”  
4
F5 APPLICATION READY NETWORK GUIDE: MICROSOFT WINDOWS SERVER 2008  
Benefits and F5 Value  
transactions, and partners, contractors, and  
suppliers all clamoring for access to different  
internal applications, organizations are struggling  
with access control and enforcement issues.  
F5 provides a complete approach to security  
enforcement and providing access control for  
Windows Server 2008, regardless of end user,  
client type, application, access network, or  
network resources.  
down appropriate administrative personnel,  
is still up, business can continue. F5 remote  
access devices support Microsoft Vista and  
access to Windows Server 2008 devices,  
and even provide secure application access  
from Windows Mobile® 5/6 PocketPC and  
Smartphones.  
and improves the ability of application  
administrations to manage applications when  
it’s necessary. F5 helps streamline the business  
process and improve the productivity and  
efficiency of operational personnel.  
One scenario often neglected in a disaster  
recovery plan is when the event doesn’t  
happen to your organization, but to your  
ISP. While many organizations do have  
Business Continuity and  
Disaster Recovery  
In the past, remote access was provided by IPsec  
VPN solutions — a complicated deployment  
which required software installation and  
maintenance on every client, and was difficult  
to enforce and control. IPSec has shown it is  
unable to keep up with the growing demands  
of remote access required by today’s enterprise  
organizations. F5’s remote access solution  
enables you to easily grant remote access to  
anyone from any device, while ensuring this  
access is carefully controlled and restricted on a  
granular basis.  
multiple links, they have to contend with  
complicated BGP configurations. F5 simplifies  
multi-homed deployments so you no longer  
need ISP cooperation, designated IP address  
blocks, ASNs, or reliance on complex BGP  
configurations to protect your network from ISP  
failures. With F5 technology, an organization  
also has the choice of aggregating multiple  
small connections together rather than having  
to invest in a single high bandwidth connection.  
This frees businesses to expand their service  
as they grow. F5 seamlessly monitors  
Disaster recovery and business continuity are  
vital to the success of an organization. Merely  
having a solid security platform cannot protect  
against unexpected events and disasters that  
create a wide range of obstacles, ranging from  
knocking out the power to wiping out entire  
data centers. These disruptive events not only  
cost organizations thousands or even millions of  
dollars, but can bring about legal ramifications  
with industry and government rules concerning  
data protection and disaster recovery. With  
the amount of irreplaceable, business critical  
information stored on the network and in  
applications like those found in Windows Server  
2008, having an effective disaster recovery plan  
is essential.  
With F5, access to Windows Server 2008  
availability and performance of multiple  
WAN ISP connections to intelligently manage  
bi-directional traffic flows to a site, providing  
fault tolerant and optimized Internet access.  
F5 devices detect errors across an entire link to  
provide end-to-end, reliable WAN connectivity.  
F5 monitors the health and availability of each  
connection, detecting outages to a link or ISP.  
In the event of a failure, traffic is dynamically  
directed across other available links so users  
stay connected.  
resources can be easily controlled on an  
extremely granular level. For example, employees  
can be granted full access to internal resources,  
while a trusted partner group can be restricted  
to a specific subset of applications, and a  
F5 products are uniquely positioned to help  
organizations mitigate disasters and other  
disruptive events. F5 is the only vendor  
to virtualize data centers, VPN access,  
contractor group could be locked down to a  
specific application or port. F5 centralizes this  
access control, and makes configuring and  
enforcing this type of control simple. F5 can even  
gather device information (like IP address or time  
of day) and determine if a resource should be  
offered. The F5 solution also includes control  
for any access network and any device, with no  
need to deploy multiple access control solutions  
for remote users, wireless LANs, and the LAN.  
optimization, and traffic in an integrated  
fashion — ensuring the Windows Server 2008  
devices and applications are always available.  
F5 provides the industry’s most comprehensive  
solution for site failover and business continuity.  
From performing comprehensive site application  
availability checks, to defining the conditions  
for dynamically and transparently shifting all  
traffic to a backup data center, failing over  
an entire site, or controlling only the affected  
applications, F5 has the complete solution.  
F5 supports virtual administration domains,  
allowing a single F5 device to be managed by  
multiple application teams without interference.  
Every user can be assigned to specific  
administrative domains which define which  
objects are visible to that user. Multiple levels of  
access are also definable for each user, with basic  
read-only users who can log on to the devices  
to monitor status of specific objects and traffic  
quantities to full administrative users capable of  
making configuration changes to every object  
on the device. This increases productivity by  
reducing the time spent in meetings, tracking  
When one of these disruptive events does  
happen, even something as simple as a snow  
storm that prevents most employees from  
making it to the office, F5 provides extremely  
secure remote access to the network and  
Windows Server 2008 deployment, ensuring  
that even though the physical office might be  
unavailable, as long as a single data center  
5
F5 APPLICATION READY NETWORK GUIDE: MICROSOFT WINDOWS SERVER 2008  
Global F5 and Windows Server 2008 Deployment  
The following example shows a global configuration, using the F5 suite of products to  
optimize, secure, and deliver Windows Server 2008 installations over the WAN and LAN.  
F5 TMOS  
Branch Office  
FirePass  
WANJet 500  
WANJet  
Routers  
WANJet 500  
WANJet 500  
WANJet  
Enterprise Manager  
BIG-IP  
Link Controller  
DMZ  
Remote Users  
Firewalls  
FirePass  
Internet or WAN  
BIG-IP  
Global Traffic Manager  
BIG-IP Application  
Security Manager  
BIG-IP  
Local Traffic Manager  
WANJet 500  
Routers  
WebAccelerator  
Disaster  
WANJet 500  
WANJet  
Recovery Site  
BIG-IP  
Link Controller  
DMZ  
WTS 2008  
IIS 7.0  
Windows Server  
2008  
FirePass  
Firewalls  
BIG-IP  
Global Traffic Manager  
F5 TMOS  
Headquarters  
BIG-IP  
Local Traffic Manager  
WTS  
2008  
Windows  
Server 2008  
IIS 7.0  
F5 TMOS  
6
F5 APPLICATION READY NETWORK GUIDE: MICROSOFT WINDOWS SERVER 2008  
Additional Information  
GTM: The BIG-IP Global Traffic Manager™  
WANJet  
Deployment Guides  
Deploying the BIG-IP System with Microsoft  
WANJet® is an appliance-based solution that  
delivers LAN-like application performance over  
the WAN. WANJet accelerates applications  
including: file transfer, e-mail, client-server  
applications, data replication, and others,  
resulting in predictable, fast performance for  
all WAN users.  
(GTM) Module provides high availability,  
maximum performance and global management  
for applications running across multiple and  
globally dispersed data centers. Seamlessly  
virtualizes FirePass VPN to automatically provide  
always-on access control.  
Internet Information Services 7.0  
Provides detailed procedures on how to  
configure the BIG-IP® Local Traffic Manager™  
(LTM) and WebAccelerator™ with Internet  
Information Services 7.0.  
ASM: The Application Security Manager™  
provides application layer protection from both  
targeted and generalized application attacks  
to ensure that applications are always available  
and performing optimally.  
Deploying the BIG-IP System with Microsoft  
Windows Server 2008 Terminal Services  
Enterprise Manager  
F5’s appliance-based Enterprise Manager  
™gives you the power to centrally discover  
and maintain the F5 devices in your network.  
With Enterprise Manager, you can archive and  
safeguard device configurations for contingency  
planning, Configure new devices from a central  
location without manually working on each  
device, easily and quickly roll-out software  
upgrades and security patches and much more.  
Provides detailed procedures on how to  
configure the BIG-IP LTM with the new version  
of Windows Terminal Services.  
WA: F5 WebAccelerator™ is an advanced  
web application delivery solution that provides  
a series of intelligent technologies designed  
to overcome problems with browsers, web  
application platforms, and WAN latency issues  
which impact user performance.  
See the Deployment Guide index on the F5  
Solution Center for more Microsoft Guides.  
For more information about the partnership  
between F5 and Microsoft, see the Microsoft  
Partner Showcase on the F5 Solution Center.  
LC: The BIG-IP Link Controller™ Module  
seamlessly monitors availability and  
performance of multiple WAN connections to  
intelligently manage bi-directional traffic flows  
to a site – providing fault tolerant, optimized  
Internet access.  
F5 Acopia ARX  
F5 Acopia™ award-winning intelligent file  
virtualization solutions decouple file access  
from physical file location. Our ARX® products  
integrate seamlessly into existing Network  
Attached Storage (NAS), Windows®, UNIX®  
and Linux environments. ARX devices provide  
industry-leading scalability, performance and  
reliability, and are specifically designed to meet  
the needs of enterprise storage environments.  
F5 Product offerings  
BIG-IP Product Family  
The BIG-IP products deliver high availability,  
improved performance, application security,  
and access control, all in one unit. A single  
BIG-IP device can do the work of a dozen  
single-purpose products. More importantly,  
it can do that work in an efficient, cohesive  
manner that is easier to manage and adapt as  
business and technology needs change.  
Feature Modules: These are individual  
feature packs that can be added to a BIG-IP  
traffic management platform. The Feature  
Modules include the Message Security,  
Intelligent Compression, L7 Rate Shaping,  
IPv6 Gateway, Advanced Client Authentication,  
SSL Acceleration, Fast Cache, and Advanced  
Routing Modules.  
iControl API  
iControl® is F5’s SOAP API exposed on each  
BIG-IP LTM system. iControl enables automation  
between the application and the network, and  
gives organizations the power and flexibility  
to ensure that applications and the network  
work together for increased reliability, security,  
and performance. F5’s developer community,  
DevCentral, has sample iControl applications  
and code. Visit the Microsoft page on  
DevCentral for Microsoft-specific forums and  
other useful information about F5 integration  
with Microsoft applications.  
Product Modules (These modules can also  
be run as standalone appliances)  
FirePass  
F5’s FirePass® SSL VPN appliance provides secure  
access to corporate applications and data using  
a standard web browser. Delivering outstanding  
performance, scalability, ease-of-use, and  
end-point security, FirePass helps increase the  
productivity of those working from home or on  
the road while keeping corporate data secure.  
LTM: The BIG-IP LTM allows organizations to  
ensure quality of service and manageability,  
apply business policies and rules to content  
delivery, support increasing traffic volumes,  
deliver their applications securely, enjoy  
operational efficiency and cost control,  
and remain flexible to future application  
and infrastructure changes to protect their  
investments.  
© 2008 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, FirePass, Acopia, ARX, WANJet, WebAccelerator are trademarks or registered trademarks of F5 Networks, Inc.  
in the U.S. and certain other countries.  
7

Mr Coffee EC4 User Manual
Lindy 20694 User Manual
Kyocera Mita FS 1900 User Manual
Hamilton Beach CJ 100 User Manual
GE 681131691024 User Manual
Casio DQR 300U User Manual
Black Box Computer Accessories KVM Modules for ServView Rack Tray User Manual
Black & Decker DE791B User Manual
Addonics Technologies Computer Drive CAUF1M 2 User Manual
ABB CONTROLMASTER CM10 User Manual