& cplSiteName &

F5 Gets Into Policy Enforcement

Craig Matsumoto
2/7/2013
50%
50%

F5 Networks Inc. is getting more serious about policy control, seeing it as a way to get more involved with helping mobile operators create new services such as premium access. The BIG-IP Policy Enforcement Manager (PEM), due to be announced Tuesday, is applicable to any network, but F5 is emphasizing its utility in mobile networks, partly because the company thinks it can tap mobile operators' rising interest in value-added services and in network functions virtualization (NFV). The fact that Mobile World Congress is coming up might be a factor, too, but there's no doubt policy-based services are important to mobile operators. Some customers have been adding policy functions to BIG-IP hardware or software by using iRules, F5's scripting language. But these weren't particularly sophisticated policy applications: They comprise things such as lists of URLs that needed special treatment, says Sean Duggan, an F5 director of product management. So, now, F5 wants to offer more complex policy enforcement as a product, making it an option in the intelligent services framework. That's the general term for F5's combination of services -- including firewalls, domain name services (DNS) and network-address translation (NAT) -- that can be packed onto one platform. It's now also starting to include elements of Service Provider Information Technology (SPIT). PEM is a Policy and Charging Enforcement Function (PCEF), putting F5 in competition with Allot Communications Ltd., Sandvine Inc. and Cisco Systems Inc. PEM monitors traffic and applies policy accordingly -- making sure a gold-package user gets the promised level of access, for instance. Asked via email whether deep packet inspection (DPI) is involved (a PCEF can involve DPI but doesn't have to), F5 answered indirectly, saying PEM can "identify applications and protocols that are being used in the network," as Product Marketing Manager Misbah Mahmoodi describes it. A PCEF has to work with a Policy and Charging Rules Function (PCRF), and Mahmoodi points out F5 has completed interoperability testing with other vendors' PCRFs. Asked whether F5 might offer its own PCRF eventually, Mahmoodi replies that F5 "will continue to leverage its strong partnerships with PCRF vendors in service provider deployments." So, what would make F5's PCEF any more worthy than those already on the market? F5 says it can offer PEM to its installed base as a software add-on, rather than adding another box to the network. F5 also points out it can augment PEM with the other capabilities the company already provides. One would be the ability to steer traffic, letting operators offer services without having to send all traffic to the requisite network elements. Take the example of video optimization. Early architectures have all the traffic going through, say, a video optimizer, even though maybe 6 to 10 percent of the traffic can actually be helped by the video optimizer. F5's framework could siphon that "6-to-10 percent of the traffic that the video optimization system can add value to," Duggan says. PEM can also tie to network functions virtualization (NFV), because BIG-IP can ask the network to add more processors or memory to a particular task. In other words, it tells an orchestration system to spin up more virtual machines. In its London technology center, F5 is demonstrating that capability in conjunction with Skyfire Inc., and the company expects to bring that demo to Mobile World Congress. In the demo, PEM notices when video traffic increases, and it tells the orchestration system to generate virtual instances of the Skyfire engine, then withdraw them down when usage decreases. For more

— Craig Matsumoto, Managing Editor, Light Reading
(1)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Craig Matsumoto
50%
50%
Craig Matsumoto,
User Rank: Light Sabre
2/11/2013 | 4:12:45 PM
re: F5 Gets Into Policy Enforcement
Policy is important, but SDN is going to steal the F5 headlines ... looks like they acquired LineRate Systems today.
Featured Video
From The Founder
Light Reading founder Steve Saunders grills Cisco's Roland Acra on how he's bringing automation to life inside the data center.
Flash Poll
Upcoming Live Events
February 26-28, 2018, Santa Clara Convention Center, CA
March 20-22, 2018, Denver Marriott Tech Center
April 4, 2018, The Westin Dallas Downtown, Dallas
May 14-17, 2018, Austin Convention Center
All Upcoming Live Events
Infographics
SmartNICs aren't just about achieving scale. They also have a major impact in reducing CAPEX and OPEX requirements.
Hot Topics
Project AirGig Goes Down to Georgia
Dan Jones, Mobile Editor, 12/13/2017
Here's Pai in Your Eye
Alan Breznick, Cable/Video Practice Leader, Light Reading, 12/11/2017
Verizon's New Fios TV Is No More
Mari Silbey, Senior Editor, Cable/Video, 12/12/2017
Ericsson & Samsung to Supply Verizon With Fixed 5G Gear
Dan Jones, Mobile Editor, 12/11/2017
Cloudy With a Chance of Automation: Telecom in 2018
Iain Morris, News Editor, 12/12/2017
Animals with Phones
Don't Fall Asleep on the Job! Click Here
Live Digital Audio

Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.

Like Us on Facebook
Twitter Feed